<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
        xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
        xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
        xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2014-01-28T04:00:09</oval:timestamp>
  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2002-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080264" comment="krb5-doc-1.10.2-3.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080265" comment="krb5-mini-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080268" comment="krb5-mini-devel-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080269" comment="krb5-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080270" comment="krb5-32bit-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080271" comment="krb5-client-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080276" comment="krb5-devel-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080277" comment="krb5-devel-32bit-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080278" comment="krb5-plugin-kdb-ldap-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080280" comment="krb5-plugin-preauth-pkinit-1.10.2-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080282" comment="krb5-server-1.10.2-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6107</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2006-6107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6107" source="CVE"/>
    <description>
    Unspecified vulnerability in the match_rule_equal function in bus/signals.c in D-Bus before 1.0.2 allows local applications to remove match rules for other applications and cause a denial of service (lost process messages).
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077821" comment="dbus-1-x11-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077824" comment="dbus-1-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077825" comment="dbus-1-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077829" comment="dbus-1-devel-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077830" comment="dbus-1-devel-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077831" comment="dbus-1-devel-doc-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077832" comment="libdbus-1-3-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077833" comment="libdbus-1-3-32bit-1.5.12-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0998</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2007-0998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0998" source="CVE"/>
    <description>
    The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6746</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2007-6746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746" source="CVE"/>
    <description>
    telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079804" comment="telepathy-idle-0.1.11-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0595</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2008-0595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595" source="CVE"/>
    <description>
    dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077821" comment="dbus-1-x11-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077824" comment="dbus-1-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077825" comment="dbus-1-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077829" comment="dbus-1-devel-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077830" comment="dbus-1-devel-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077831" comment="dbus-1-devel-doc-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077832" comment="libdbus-1-3-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077833" comment="libdbus-1-3-32bit-1.5.12-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3834</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2008-3834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834" source="CVE"/>
    <description>
    The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077821" comment="dbus-1-x11-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077824" comment="dbus-1-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077825" comment="dbus-1-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077829" comment="dbus-1-devel-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077830" comment="dbus-1-devel-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077831" comment="dbus-1-devel-doc-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077832" comment="libdbus-1-3-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077833" comment="libdbus-1-3-32bit-1.5.12-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4311</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2008-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311" source="CVE"/>
    <description>
    The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077821" comment="dbus-1-x11-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077824" comment="dbus-1-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077825" comment="dbus-1-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077829" comment="dbus-1-devel-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077830" comment="dbus-1-devel-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077831" comment="dbus-1-devel-doc-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077832" comment="libdbus-1-3-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077833" comment="libdbus-1-3-32bit-1.5.12-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2693</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2009-2693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693" source="CVE"/>
    <description>
    Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2901</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2009-2901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901" source="CVE"/>
    <description>
    The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2902</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2009-2902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902" source="CVE"/>
    <description>
    Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5031</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2009-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5031" source="CVE"/>
    <description>
    ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089867" comment="apache2-mod_security2-2.7.5-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2494</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2010-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2494" source="CVE"/>
    <description>
    Multiple buffer underflows in the base64 decoder in base64.c in (1) bogofilter and (2) bogolexer in bogofilter before 1.2.2 allow remote attackers to cause a denial of service (heap memory corruption and application crash) via an e-mail message with invalid base64 data that begins with an = (equals) character.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078289" comment="bogofilter-1.2.3-17.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2010-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
    <description>
    Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077821" comment="dbus-1-x11-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077824" comment="dbus-1-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077825" comment="dbus-1-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077829" comment="dbus-1-devel-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077830" comment="dbus-1-devel-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077831" comment="dbus-1-devel-doc-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077832" comment="libdbus-1-3-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077833" comment="libdbus-1-3-32bit-1.5.12-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5105</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2010-5105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5105" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078828" comment="blender-2.63a-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078830" comment="blender-lang-2.63a-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1398</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-1398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1398" source="CVE"/>
    <description>
    The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080967" comment="apache2-mod_php5-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080969" comment="php5-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080970" comment="php5-bcmath-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080972" comment="php5-bz2-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080974" comment="php5-calendar-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080976" comment="php5-ctype-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080978" comment="php5-curl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080980" comment="php5-dba-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080984" comment="php5-devel-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080985" comment="php5-dom-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080987" comment="php5-enchant-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080989" comment="php5-exif-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080991" comment="php5-fastcgi-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080993" comment="php5-fileinfo-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080995" comment="php5-fpm-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080997" comment="php5-ftp-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080999" comment="php5-gd-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081001" comment="php5-gettext-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081003" comment="php5-gmp-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081005" comment="php5-iconv-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081007" comment="php5-imap-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081009" comment="php5-intl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081011" comment="php5-json-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081013" comment="php5-ldap-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081015" comment="php5-mbstring-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081017" comment="php5-mcrypt-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081019" comment="php5-mssql-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081021" comment="php5-mysql-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081023" comment="php5-odbc-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081025" comment="php5-openssl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081027" comment="php5-pcntl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081029" comment="php5-pdo-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081031" comment="php5-pear-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081032" comment="php5-pgsql-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081034" comment="php5-phar-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081036" comment="php5-posix-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081038" comment="php5-pspell-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081040" comment="php5-readline-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081042" comment="php5-shmop-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081044" comment="php5-snmp-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081046" comment="php5-soap-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081048" comment="php5-sockets-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081050" comment="php5-sqlite-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081052" comment="php5-suhosin-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081054" comment="php5-sysvmsg-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081056" comment="php5-sysvsem-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081058" comment="php5-sysvshm-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081060" comment="php5-tidy-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081062" comment="php5-tokenizer-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081064" comment="php5-wddx-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081066" comment="php5-xmlreader-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081068" comment="php5-xmlrpc-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081070" comment="php5-xmlwriter-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081072" comment="php5-xsl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081074" comment="php5-zip-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081076" comment="php5-zlib-5.3.15-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1764</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-1764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1764" source="CVE"/>
    <description>
    Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077896" comment="exim-4.80.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077899" comment="eximon-4.80.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077901" comment="eximstats-html-4.80.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
    <description>
    crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091360" comment="whois-5.0.26-10.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3571</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3571" source="CVE"/>
    <description>
    Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session.  NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081288" comment="python-virtualbox-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081290" comment="virtualbox-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081293" comment="virtualbox-devel-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081294" comment="virtualbox-guest-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081296" comment="virtualbox-guest-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081298" comment="virtualbox-guest-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081300" comment="virtualbox-guest-tools-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081302" comment="virtualbox-guest-x11-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081304" comment="virtualbox-host-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081306" comment="virtualbox-host-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081308" comment="virtualbox-host-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081310" comment="virtualbox-qt-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081312" comment="virtualbox-websrv-4.1.22-1.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4388</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-4388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4388" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011.  Notes: none.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080967" comment="apache2-mod_php5-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080969" comment="php5-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080970" comment="php5-bcmath-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080972" comment="php5-bz2-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080974" comment="php5-calendar-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080976" comment="php5-ctype-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080978" comment="php5-curl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080980" comment="php5-dba-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080984" comment="php5-devel-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080985" comment="php5-dom-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080987" comment="php5-enchant-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080989" comment="php5-exif-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080991" comment="php5-fastcgi-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080993" comment="php5-fileinfo-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080995" comment="php5-fpm-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080997" comment="php5-ftp-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080999" comment="php5-gd-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081001" comment="php5-gettext-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081003" comment="php5-gmp-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081005" comment="php5-iconv-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081007" comment="php5-imap-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081009" comment="php5-intl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081011" comment="php5-json-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081013" comment="php5-ldap-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081015" comment="php5-mbstring-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081017" comment="php5-mcrypt-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081019" comment="php5-mssql-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081021" comment="php5-mysql-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081023" comment="php5-odbc-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081025" comment="php5-openssl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081027" comment="php5-pcntl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081029" comment="php5-pdo-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081031" comment="php5-pear-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081032" comment="php5-pgsql-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081034" comment="php5-phar-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081036" comment="php5-posix-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081038" comment="php5-pspell-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081040" comment="php5-readline-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081042" comment="php5-shmop-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081044" comment="php5-snmp-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081046" comment="php5-soap-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081048" comment="php5-sockets-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081050" comment="php5-sqlite-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081052" comment="php5-suhosin-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081054" comment="php5-sysvmsg-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081056" comment="php5-sysvsem-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081058" comment="php5-sysvshm-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081060" comment="php5-tidy-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081062" comment="php5-tokenizer-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081064" comment="php5-wddx-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081066" comment="php5-xmlreader-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081068" comment="php5-xmlrpc-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081070" comment="php5-xmlwriter-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081072" comment="php5-xsl-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081074" comment="php5-zip-5.3.15-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081076" comment="php5-zlib-5.3.15-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4620</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-4620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4620" source="CVE"/>
    <description>
    Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB 1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted remote attackers to execute arbitrary code via vectors involving a long error message, as demonstrated by a crafted acc file for TORCS. NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077953" comment="plib-1.8.5-76.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077956" comment="plib-devel-1.8.5-76.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4966</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-4966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4966" source="CVE"/>
    <description>
    modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078526" comment="freeradius-server-2.1.12-4.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078529" comment="freeradius-server-devel-2.1.12-4.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078530" comment="freeradius-server-dialupadmin-2.1.12-4.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078531" comment="freeradius-server-doc-2.1.12-4.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078532" comment="freeradius-server-libs-2.1.12-4.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078534" comment="freeradius-server-utils-2.1.12-4.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0105</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0105" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization 4.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Windows Guest Additions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081288" comment="python-virtualbox-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081290" comment="virtualbox-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081293" comment="virtualbox-devel-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081294" comment="virtualbox-guest-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081296" comment="virtualbox-guest-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081298" comment="virtualbox-guest-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081300" comment="virtualbox-guest-tools-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081302" comment="virtualbox-guest-x11-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081304" comment="virtualbox-host-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081306" comment="virtualbox-host-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081308" comment="virtualbox-host-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081310" comment="virtualbox-qt-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081312" comment="virtualbox-websrv-4.1.22-1.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0111</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0111" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization 4.1 allows local users to affect confidentiality and integrity via unknown vectors related to Shared Folders.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081288" comment="python-virtualbox-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081290" comment="virtualbox-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081293" comment="virtualbox-devel-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081294" comment="virtualbox-guest-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081296" comment="virtualbox-guest-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081298" comment="virtualbox-guest-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081300" comment="virtualbox-guest-tools-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081302" comment="virtualbox-guest-x11-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081304" comment="virtualbox-host-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081306" comment="virtualbox-host-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081308" comment="virtualbox-host-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081310" comment="virtualbox-qt-4.1.22-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081312" comment="virtualbox-websrv-4.1.22-1.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0547</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0547" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and "a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited." NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "toolkit internals references."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081140" comment="java-1_7_0-openjdk-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081143" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081145" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081147" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081148" comment="java-1_7_0-openjdk-src-1.7.0.6-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0866</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866" source="CVE"/>
    <description>
    CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081149" comment="libecpg6-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081151" comment="libpq5-32bit-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081152" comment="libpq5-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081155" comment="postgresql-devel-32bit-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081156" comment="postgresql-devel-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081159" comment="postgresql-libs-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081161" comment="postgresql-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081162" comment="postgresql-contrib-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081166" comment="postgresql-docs-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081167" comment="postgresql-plperl-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081169" comment="postgresql-plpython-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081171" comment="postgresql-pltcl-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081173" comment="postgresql-server-9.1.3-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0867</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867" source="CVE"/>
    <description>
    PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081149" comment="libecpg6-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081151" comment="libpq5-32bit-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081152" comment="libpq5-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081155" comment="postgresql-devel-32bit-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081156" comment="postgresql-devel-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081159" comment="postgresql-libs-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081161" comment="postgresql-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081162" comment="postgresql-contrib-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081166" comment="postgresql-docs-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081167" comment="postgresql-plperl-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081169" comment="postgresql-plpython-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081171" comment="postgresql-pltcl-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081173" comment="postgresql-server-9.1.3-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0868</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868" source="CVE"/>
    <description>
    CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081149" comment="libecpg6-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081151" comment="libpq5-32bit-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081152" comment="libpq5-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081155" comment="postgresql-devel-32bit-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081156" comment="postgresql-devel-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081159" comment="postgresql-libs-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081161" comment="postgresql-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081162" comment="postgresql-contrib-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081166" comment="postgresql-docs-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081167" comment="postgresql-plperl-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081169" comment="postgresql-plpython-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081171" comment="postgresql-pltcl-9.1.3-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081173" comment="postgresql-server-9.1.3-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0875</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0875" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079221" comment="systemtap-docs-1.7-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079222" comment="systemtap-1.7-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079225" comment="systemtap-runtime-1.7-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079227" comment="systemtap-sdt-devel-1.7-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079228" comment="systemtap-server-1.7-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1016</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016" source="CVE"/>
    <description>
    The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079201" comment="krb5-doc-1.10.2-3.12.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079202" comment="krb5-mini-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079205" comment="krb5-mini-devel-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079206" comment="krb5-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079207" comment="krb5-32bit-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079208" comment="krb5-client-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079213" comment="krb5-devel-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079214" comment="krb5-devel-32bit-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079215" comment="krb5-plugin-kdb-ldap-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079217" comment="krb5-plugin-preauth-pkinit-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079219" comment="krb5-server-1.10.2-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1682</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1682" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "XMLDecoder security issue via ClassFinder."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081140" comment="java-1_7_0-openjdk-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081143" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081145" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081147" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081148" comment="java-1_7_0-openjdk-src-1.7.0.6-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2142</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090273" comment="libpoppler-qt4-4-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090275" comment="libpoppler-qt4-devel-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090276" comment="poppler-qt-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090278" comment="libpoppler-cpp0-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090280" comment="libpoppler-devel-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090281" comment="libpoppler-glib-devel-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090282" comment="libpoppler-glib8-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090284" comment="libpoppler25-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090286" comment="poppler-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090288" comment="poppler-tools-0.20.0-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090290" comment="typelib-1_0-Poppler-0_18-0.20.0-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2143</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143" source="CVE"/>
    <description>
    The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081232" comment="libecpg6-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081234" comment="libpq5-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081235" comment="libpq5-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081238" comment="postgresql-devel-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081239" comment="postgresql-devel-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081242" comment="postgresql-libs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081244" comment="postgresql-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081245" comment="postgresql-contrib-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081249" comment="postgresql-docs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081250" comment="postgresql-plperl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081252" comment="postgresql-plpython-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081254" comment="postgresql-pltcl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081256" comment="postgresql-server-9.1.5-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2328</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2328" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078241" comment="sblim-cim-client2-2.1.12-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078242" comment="sblim-cim-client2-javadoc-2.1.12-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078243" comment="sblim-cim-client2-manual-2.1.12-2.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2582</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2582" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.13, 3.0.x before 3.0.15, and 3.1.x before 3.1.9, and OTRS ITSM 2.1.x before 2.1.5, 3.0.x before 3.0.6, and 3.1.x before 3.1.6, allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a Cascading Style Sheets (CSS) expression property in the STYLE attribute of an arbitrary element or (2) UTF-7 text in an HTTP-EQUIV="CONTENT-TYPE" META element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080801" comment="otrs-3.1.9-20.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080802" comment="otrs-doc-3.1.9-20.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080803" comment="otrs-itsm-3.1.6-20.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2625</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625" source="CVE"/>
    <description>
    The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2655</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655" source="CVE"/>
    <description>
    PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081232" comment="libecpg6-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081234" comment="libpq5-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081235" comment="libpq5-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081238" comment="postgresql-devel-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081239" comment="postgresql-devel-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081242" comment="postgresql-libs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081244" comment="postgresql-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081245" comment="postgresql-contrib-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081249" comment="postgresql-docs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081250" comment="postgresql-plperl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081252" comment="postgresql-plpython-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081254" comment="postgresql-pltcl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081256" comment="postgresql-server-9.1.5-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2660</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2660" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080687" comment="rubygem-actionmailer-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080688" comment="rubygem-actionmailer-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080689" comment="rubygem-actionpack-3_2-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080690" comment="rubygem-actionpack-3_2-doc-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080691" comment="rubygem-activemodel-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080692" comment="rubygem-activemodel-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080693" comment="rubygem-activerecord-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080694" comment="rubygem-activerecord-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080695" comment="rubygem-activeresource-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080696" comment="rubygem-activeresource-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080697" comment="rubygem-activesupport-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080698" comment="rubygem-activesupport-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080699" comment="rubygem-journey-1_0-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080700" comment="rubygem-journey-1_0-doc-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080701" comment="rubygem-journey-1_0-testsuite-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080702" comment="rubygem-rails-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080703" comment="rubygem-rails-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080704" comment="rubygem-railties-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080705" comment="rubygem-railties-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080706" comment="rubygem-sprockets-2_1-2.1.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080707" comment="rubygem-sprockets-2_1-doc-2.1.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2661</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2661" source="CVE"/>
    <description>
    The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080687" comment="rubygem-actionmailer-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080688" comment="rubygem-actionmailer-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080689" comment="rubygem-actionpack-3_2-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080690" comment="rubygem-actionpack-3_2-doc-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080691" comment="rubygem-activemodel-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080692" comment="rubygem-activemodel-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080693" comment="rubygem-activerecord-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080694" comment="rubygem-activerecord-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080695" comment="rubygem-activeresource-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080696" comment="rubygem-activeresource-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080697" comment="rubygem-activesupport-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080698" comment="rubygem-activesupport-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080699" comment="rubygem-journey-1_0-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080700" comment="rubygem-journey-1_0-doc-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080701" comment="rubygem-journey-1_0-testsuite-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080702" comment="rubygem-rails-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080703" comment="rubygem-rails-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080704" comment="rubygem-railties-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080705" comment="rubygem-railties-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080706" comment="rubygem-sprockets-2_1-2.1.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080707" comment="rubygem-sprockets-2_1-doc-2.1.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2669</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2669" source="CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078106" comment="hyper-v-4-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2686</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686" source="CVE"/>
    <description>
    crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078917" comment="libopenssl-devel-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078918" comment="libopenssl-devel-32bit-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078919" comment="libopenssl1_0_0-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078920" comment="libopenssl1_0_0-32bit-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078923" comment="openssl-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078926" comment="openssl-doc-1.0.1e-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2687</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078631" comment="apache2-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078634" comment="apache2-devel-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078635" comment="apache2-doc-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078636" comment="apache2-event-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078638" comment="apache2-example-pages-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078639" comment="apache2-itk-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078641" comment="apache2-prefork-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078643" comment="apache2-utils-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078645" comment="apache2-worker-2.2.22-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079419" comment="apache2-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079422" comment="apache2-devel-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079423" comment="apache2-doc-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079424" comment="apache2-event-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079426" comment="apache2-example-pages-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079427" comment="apache2-itk-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079429" comment="apache2-prefork-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079431" comment="apache2-utils-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079433" comment="apache2-worker-2.2.22-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2694</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2694" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "['xyz', nil]" values, a related issue to CVE-2012-2660.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080687" comment="rubygem-actionmailer-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080688" comment="rubygem-actionmailer-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080689" comment="rubygem-actionpack-3_2-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080690" comment="rubygem-actionpack-3_2-doc-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080691" comment="rubygem-activemodel-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080692" comment="rubygem-activemodel-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080693" comment="rubygem-activerecord-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080694" comment="rubygem-activerecord-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080695" comment="rubygem-activeresource-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080696" comment="rubygem-activeresource-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080697" comment="rubygem-activesupport-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080698" comment="rubygem-activesupport-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080699" comment="rubygem-journey-1_0-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080700" comment="rubygem-journey-1_0-doc-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080701" comment="rubygem-journey-1_0-testsuite-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080702" comment="rubygem-rails-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080703" comment="rubygem-rails-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080704" comment="rubygem-railties-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080705" comment="rubygem-railties-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080706" comment="rubygem-sprockets-2_1-2.1.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080707" comment="rubygem-sprockets-2_1-doc-2.1.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2695</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2695" source="CVE"/>
    <description>
    The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078705" comment="rubygem-actionmailer-2_3-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078706" comment="rubygem-actionmailer-2_3-doc-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078707" comment="rubygem-actionmailer-2_3-testsuite-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078708" comment="rubygem-actionmailer-3_2-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078709" comment="rubygem-actionmailer-3_2-doc-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078710" comment="rubygem-actionmailer-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078711" comment="rubygem-actionpack-2_3-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078712" comment="rubygem-actionpack-2_3-doc-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078713" comment="rubygem-actionpack-2_3-testsuite-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078714" comment="rubygem-actionpack-3_2-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078715" comment="rubygem-actionpack-3_2-doc-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078716" comment="rubygem-actionpack-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078717" comment="rubygem-activemodel-3_2-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078718" comment="rubygem-activemodel-3_2-doc-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078719" comment="rubygem-activerecord-2_3-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078720" comment="rubygem-activerecord-2_3-doc-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078721" comment="rubygem-activerecord-2_3-testsuite-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078722" comment="rubygem-activerecord-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078723" comment="rubygem-activerecord-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078724" comment="rubygem-activerecord-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078725" comment="rubygem-activeresource-2_3-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078726" comment="rubygem-activeresource-2_3-doc-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078727" comment="rubygem-activeresource-2_3-testsuite-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078728" comment="rubygem-activeresource-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078729" comment="rubygem-activeresource-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078730" comment="rubygem-activeresource-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078731" comment="rubygem-activesupport-2_3-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078732" comment="rubygem-activesupport-2_3-doc-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078733" comment="rubygem-activesupport-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078734" comment="rubygem-activesupport-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078735" comment="rubygem-activesupport-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078736" comment="rubygem-rack-1_1-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078737" comment="rubygem-rack-1_1-doc-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078738" comment="rubygem-rack-1_1-testsuite-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078739" comment="rubygem-rack-1_2-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078740" comment="rubygem-rack-1_2-doc-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078741" comment="rubygem-rack-1_2-testsuite-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078742" comment="rubygem-rack-1_3-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078743" comment="rubygem-rack-1_3-doc-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078744" comment="rubygem-rack-1_3-testsuite-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078745" comment="rubygem-rack-1_4-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078746" comment="rubygem-rack-1_4-doc-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078747" comment="rubygem-rack-1_4-testsuite-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078748" comment="rubygem-rails-2_3-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078749" comment="rubygem-rails-2_3-doc-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078750" comment="rubygem-rails-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078751" comment="rubygem-rails-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078752" comment="rubygem-rails-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078753" comment="rubygem-railties-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078754" comment="rubygem-railties-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078755" comment="rubygem-sprockets-2_2-2.2.2-2.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078756" comment="rubygem-sprockets-2_2-doc-2.2.2-2.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080687" comment="rubygem-actionmailer-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080688" comment="rubygem-actionmailer-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080689" comment="rubygem-actionpack-3_2-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080690" comment="rubygem-actionpack-3_2-doc-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080691" comment="rubygem-activemodel-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080692" comment="rubygem-activemodel-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080693" comment="rubygem-activerecord-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080694" comment="rubygem-activerecord-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080695" comment="rubygem-activeresource-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080696" comment="rubygem-activeresource-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080697" comment="rubygem-activesupport-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080698" comment="rubygem-activesupport-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080699" comment="rubygem-journey-1_0-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080700" comment="rubygem-journey-1_0-doc-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080701" comment="rubygem-journey-1_0-testsuite-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080702" comment="rubygem-rails-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080703" comment="rubygem-rails-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080704" comment="rubygem-railties-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080705" comment="rubygem-railties-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080706" comment="rubygem-sprockets-2_1-2.1.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080707" comment="rubygem-sprockets-2_1-doc-2.1.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2733</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2733" source="CVE"/>
    <description>
    java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2751</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2751" source="CVE"/>
    <description>
    ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089867" comment="apache2-mod_security2-2.7.5-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2763</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2763" source="CVE"/>
    <description>
    Buffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081078" comment="gimp-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081079" comment="gimp-branding-upstream-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081082" comment="gimp-devel-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081084" comment="gimp-help-browser-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081086" comment="gimp-lang-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081087" comment="gimp-plugins-python-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081089" comment="libgimp-2_0-0-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081090" comment="libgimp-2_0-0-32bit-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081093" comment="libgimpui-2_0-0-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081094" comment="libgimpui-2_0-0-32bit-2.8.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2864</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2864" source="CVE"/>
    <description>
    Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080815" comment="Mesa-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080816" comment="Mesa-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080820" comment="Mesa-devel-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080821" comment="Mesa-devel-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080822" comment="Mesa-libEGL-devel-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080823" comment="Mesa-libEGL-devel-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080824" comment="Mesa-libEGL1-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080825" comment="Mesa-libEGL1-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080828" comment="Mesa-libGL-devel-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080829" comment="Mesa-libGL-devel-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080830" comment="Mesa-libGL1-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080831" comment="Mesa-libGL1-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080834" comment="Mesa-libGLESv1_CM-devel-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080835" comment="Mesa-libGLESv1_CM-devel-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080836" comment="Mesa-libGLESv1_CM1-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080837" comment="Mesa-libGLESv1_CM1-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080840" comment="Mesa-libGLESv2-2-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080841" comment="Mesa-libGLESv2-2-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080844" comment="Mesa-libGLESv2-devel-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080845" comment="Mesa-libGLESv2-devel-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080846" comment="Mesa-libGLU-devel-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080847" comment="Mesa-libGLU-devel-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080848" comment="Mesa-libGLU1-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080849" comment="Mesa-libGLU1-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080852" comment="Mesa-libIndirectGL1-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080853" comment="Mesa-libIndirectGL1-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080856" comment="Mesa-libglapi0-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080857" comment="Mesa-libglapi0-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080860" comment="libOSMesa8-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080861" comment="libOSMesa8-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080864" comment="libXvMC_nouveau-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080865" comment="libXvMC_nouveau-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080868" comment="libXvMC_r300-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080869" comment="libXvMC_r300-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080872" comment="libXvMC_r600-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080873" comment="libXvMC_r600-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080876" comment="libXvMC_softpipe-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080877" comment="libXvMC_softpipe-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080880" comment="libgbm-devel-0.0.0-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080881" comment="libgbm-devel-32bit-0.0.0-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080882" comment="libgbm1-0.0.0-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080883" comment="libgbm1-32bit-0.0.0-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080886" comment="libvdpau_nouveau-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080887" comment="libvdpau_nouveau-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080890" comment="libvdpau_r300-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080891" comment="libvdpau_r300-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080894" comment="libvdpau_r600-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080895" comment="libvdpau_r600-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080898" comment="libvdpau_softpipe-32bit-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080899" comment="libvdpau_softpipe-8.0.4-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080902" comment="libxatracker-devel-1.0.0-20.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080903" comment="libxatracker1-1.0.0-20.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2865</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2865" source="CVE"/>
    <description>
    Google Chrome before 21.0.1180.89 does not properly perform line breaking, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2866</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2866" source="CVE"/>
    <description>
    Google Chrome before 21.0.1180.89 does not properly perform a cast of an unspecified variable during handling of run-in elements, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2867</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2867" source="CVE"/>
    <description>
    The SPDY implementation in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2868</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2868" source="CVE"/>
    <description>
    Race condition in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving improper interaction between worker processes and an XMLHttpRequest (aka XHR) object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2869</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2869" source="CVE"/>
    <description>
    Google Chrome before 21.0.1180.89 does not properly load URLs, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a "stale buffer."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2870</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2870" source="CVE"/>
    <description>
    libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPathPattern function in libxslt/pattern.c and (2) the xsltGenerateIdFunction function in libxslt/functions.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2871</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2871" source="CVE"/>
    <description>
    libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2872</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2872" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in an SSL interstitial page in Google Chrome before 21.0.1180.89 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081097" comment="chromedriver-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081099" comment="chromium-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081102" comment="chromium-desktop-gnome-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081103" comment="chromium-desktop-kde-23.0.1255.0-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081104" comment="chromium-suid-helper-23.0.1255.0-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2874</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2874" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2883.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2876</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2876" source="CVE"/>
    <description>
    Buffer overflow in the SSE2 optimization functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2877</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2877" source="CVE"/>
    <description>
    The extension system in Google Chrome before 22.0.1229.79 does not properly handle modal dialogs, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2878</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2878" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2879</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2879" source="CVE"/>
    <description>
    Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service (DOM topology corruption) via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2880</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2880" source="CVE"/>
    <description>
    Race condition in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the plug-in paint buffer.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2881</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2881" source="CVE"/>
    <description>
    Google Chrome before 22.0.1229.79 does not properly handle plug-ins, which allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2882</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2882" source="CVE"/>
    <description>
    FFmpeg, as used in Google Chrome before 22.0.1229.79, does not properly handle OGG containers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "wild pointer" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2883</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2883" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2874.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2884</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2884" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2885</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2885" source="CVE"/>
    <description>
    Double free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to application exit.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2886</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2886" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors related to the Google V8 bindings, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2887</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2887" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving onclick events.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2888</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2888" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG text references.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2889</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2889" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2891</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2891" source="CVE"/>
    <description>
    The IPC implementation in Google Chrome before 22.0.1229.79 allows attackers to obtain potentially sensitive information about memory addresses via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2892</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2892" source="CVE"/>
    <description>
    Unspecified vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to bypass the pop-up blocker via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2893</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2893" source="CVE"/>
    <description>
    Double free vulnerability in libxslt, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XSL transforms.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2894</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2894" source="CVE"/>
    <description>
    Google Chrome before 22.0.1229.79 does not properly handle graphics-context data structures, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2896</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2896" source="CVE"/>
    <description>
    Integer overflow in the WebGL implementation in Google Chrome before 22.0.1229.79 on Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081435" comment="chromedriver-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081437" comment="chromium-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081440" comment="chromium-desktop-gnome-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081441" comment="chromium-desktop-kde-24.0.1290.0-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081442" comment="chromium-suid-helper-24.0.1290.0-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2934</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934" source="CVE"/>
    <description>
    Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not properly protect against a certain AMD processor bug, which allows local guest OS users to cause a denial of service (host hang) via sequential execution of instructions across a non-canonical boundary, a different vulnerability than CVE-2012-0217.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2944</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944" source="CVE"/>
    <description>
    Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080772" comment="libupsclient1-2.6.3-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080774" comment="nut-2.6.3-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080775" comment="nut-cgi-2.6.3-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080779" comment="nut-devel-2.6.3-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080780" comment="nut-drivers-net-2.6.3-2.4.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3136</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3136" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-1682.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081140" comment="java-1_7_0-openjdk-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081143" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081145" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081147" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081148" comment="java-1_7_0-openjdk-src-1.7.0.6-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3174</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422.  NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422.  This identifier is for a different vulnerability whose details are not public as of 20130114.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078570" comment="java-1_7_0-openjdk-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078573" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078575" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078577" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078578" comment="java-1_7_0-openjdk-src-1.7.0.6-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3216</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3291</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3291" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080257" comment="openconnect-3.20-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080260" comment="openconnect-devel-3.20-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080261" comment="openconnect-doc-3.20-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080262" comment="openconnect-lang-3.20-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3386</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386" source="CVE"/>
    <description>
    The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077894" comment="automake-testsuite-1.12.1-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077895" comment="automake-1.12.1-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3412</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412" source="CVE"/>
    <description>
    The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081314" comment="kernel-debug-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081315" comment="kernel-debug-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081319" comment="kernel-debug-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081321" comment="kernel-default-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081322" comment="kernel-default-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081326" comment="kernel-default-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081328" comment="kernel-desktop-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081329" comment="kernel-desktop-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081333" comment="kernel-desktop-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081335" comment="kernel-docs-3.4.11-2.16.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081336" comment="kernel-ec2-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081337" comment="kernel-ec2-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081341" comment="kernel-ec2-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081343" comment="kernel-ec2-extra-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081345" comment="kernel-pae-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081346" comment="kernel-pae-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081350" comment="kernel-pae-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081352" comment="kernel-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081353" comment="kernel-source-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081354" comment="kernel-source-vanilla-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081355" comment="kernel-syms-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081356" comment="kernel-trace-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081357" comment="kernel-trace-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081361" comment="kernel-trace-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081363" comment="kernel-vanilla-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081366" comment="kernel-vanilla-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081368" comment="kernel-xen-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081369" comment="kernel-xen-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081373" comment="kernel-xen-devel-3.4.11-2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3418</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418" source="CVE"/>
    <description>
    libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds function in p_creds.c; (2) the string byte number value to the __pmDecodeNameList function in p_pmns.c; (3) the numids value to the __pmDecodeIDList function in p_pmns.c; (4) unspecified vectors to the __pmDecodeProfile function in p_profile.c; the (5) status number value or (6) string number value to the __pmDecodeNameList function in p_pmns.c; (7) certain input to the __pmDecodeResult function in p_result.c; (8) the name length field (namelen) to the DecodeNameReq function in p_pmns.c; (9) a crafted PDU_FETCH request to the __pmDecodeFetch function in p_fetch.c; (10) the namelen field in the __pmDecodeInstanceReq function in p_instance.c; (11) the buflen field to the __pmDecodeText function in p_text.c; (12) PDU_INSTANCE packets to the __pmDecodeInstance in p_instance.c; or the (13) c_numpmid or (14) v_numval fields to the __pmDecodeLogControl function in p_lcontrol.c, which triggers integer overflows, heap-based buffer overflows, and/or buffer over-reads.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080745" comment="libpcp-devel-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080747" comment="libpcp3-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080749" comment="pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080752" comment="pcp-import-iostat2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080753" comment="pcp-import-mrtg2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080754" comment="pcp-import-sar2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080755" comment="pcp-import-sheet2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080756" comment="perl-PCP-LogImport-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080758" comment="perl-PCP-LogSummary-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080759" comment="perl-PCP-MMV-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080761" comment="perl-PCP-PMDA-3.6.5-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3419</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419" source="CVE"/>
    <description>
    Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080745" comment="libpcp-devel-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080747" comment="libpcp3-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080749" comment="pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080752" comment="pcp-import-iostat2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080753" comment="pcp-import-mrtg2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080754" comment="pcp-import-sar2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080755" comment="pcp-import-sheet2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080756" comment="perl-PCP-LogImport-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080758" comment="perl-PCP-LogSummary-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080759" comment="perl-PCP-MMV-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080761" comment="perl-PCP-PMDA-3.6.5-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3420</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420" source="CVE"/>
    <description>
    Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src/dofetch.c or (2) a negative type value to the __pmGetPDU function in libpcp/src/pdu.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080745" comment="libpcp-devel-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080747" comment="libpcp3-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080749" comment="pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080752" comment="pcp-import-iostat2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080753" comment="pcp-import-mrtg2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080754" comment="pcp-import-sar2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080755" comment="pcp-import-sheet2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080756" comment="perl-PCP-LogImport-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080758" comment="perl-PCP-LogSummary-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080759" comment="perl-PCP-MMV-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080761" comment="perl-PCP-PMDA-3.6.5-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3421</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421" source="CVE"/>
    <description>
    The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related to an "event-driven programming flaw."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080745" comment="libpcp-devel-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080747" comment="libpcp3-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080749" comment="pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080752" comment="pcp-import-iostat2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080753" comment="pcp-import-mrtg2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080754" comment="pcp-import-sar2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080755" comment="pcp-import-sheet2pcp-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080756" comment="perl-PCP-LogImport-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080758" comment="perl-PCP-LogSummary-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080759" comment="perl-PCP-MMV-3.6.5-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080761" comment="perl-PCP-PMDA-3.6.5-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3422</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422" source="CVE"/>
    <description>
    The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web page, which causes an uninitialized memory location to be read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079822" comment="icedtea-web-1.4-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079825" comment="icedtea-web-javadoc-1.4-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3423</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079822" comment="icedtea-web-1.4-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079825" comment="icedtea-web-javadoc-1.4-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3424</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3424" source="CVE"/>
    <description>
    The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080687" comment="rubygem-actionmailer-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080688" comment="rubygem-actionmailer-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080689" comment="rubygem-actionpack-3_2-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080690" comment="rubygem-actionpack-3_2-doc-3.2.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080691" comment="rubygem-activemodel-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080692" comment="rubygem-activemodel-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080693" comment="rubygem-activerecord-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080694" comment="rubygem-activerecord-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080695" comment="rubygem-activeresource-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080696" comment="rubygem-activeresource-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080697" comment="rubygem-activesupport-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080698" comment="rubygem-activesupport-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080699" comment="rubygem-journey-1_0-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080700" comment="rubygem-journey-1_0-doc-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080701" comment="rubygem-journey-1_0-testsuite-1.0.4-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080702" comment="rubygem-rails-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080703" comment="rubygem-rails-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080704" comment="rubygem-railties-3_2-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080705" comment="rubygem-railties-3_2-doc-3.2.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080706" comment="rubygem-sprockets-2_1-2.1.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080707" comment="rubygem-sprockets-2_1-doc-2.1.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3432</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432" source="CVE"/>
    <description>
    The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3433</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433" source="CVE"/>
    <description>
    Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3436</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3436" source="CVE"/>
    <description>
    OpenTTD 0.6.0 through 1.2.1 does not properly validate requests to clear a water tile, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a certain sequence of steps related to "the water/coast aspect of tiles which also have railtracks on one half."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080767" comment="openttd-1.2.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080768" comment="openttd-data-1.2.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080770" comment="openttd-dedicated-1.2.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3437</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437" source="CVE"/>
    <description>
    The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8 and earlier does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079322" comment="ImageMagick-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079325" comment="ImageMagick-devel-32bit-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079326" comment="ImageMagick-devel-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079327" comment="ImageMagick-doc-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079328" comment="ImageMagick-extra-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079330" comment="libMagick++-devel-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079331" comment="libMagick++5-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079333" comment="libMagickCore5-32bit-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079334" comment="libMagickCore5-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079337" comment="libMagickWand5-32bit-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079338" comment="libMagickWand5-6.7.6.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079341" comment="perl-PerlMagick-6.7.6.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3438</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438" source="CVE"/>
    <description>
    The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079343" comment="GraphicsMagick-1.3.15-14.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079346" comment="GraphicsMagick-devel-1.3.15-14.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079347" comment="libGraphicsMagick++-devel-1.3.15-14.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079348" comment="libGraphicsMagick++3-1.3.15-14.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079350" comment="libGraphicsMagick3-1.3.15-14.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079352" comment="libGraphicsMagickWand2-1.3.15-14.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079354" comment="perl-GraphicsMagick-1.3.15-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3456</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3456" source="CVE"/>
    <description>
    Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document.  NOTE: this is the same vulnerability as CVE-2012-3455, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080708" comment="calligra-doc-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080709" comment="calligra-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080710" comment="calligra-braindump-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080714" comment="calligra-devel-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080715" comment="calligra-flow-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080717" comment="calligra-karbon-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080719" comment="calligra-kexi-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080721" comment="calligra-kexi-mssql-driver-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080723" comment="calligra-kexi-mysql-driver-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080725" comment="calligra-kexi-postgresql-driver-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080727" comment="calligra-kexi-spreadsheet-import-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080729" comment="calligra-kexi-xbase-driver-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080731" comment="calligra-krita-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080733" comment="calligra-kthesaurus-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080735" comment="calligra-plan-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080737" comment="calligra-sheets-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080739" comment="calligra-stage-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080741" comment="calligra-tools-2.4.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080743" comment="calligra-words-2.4.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3461</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461" source="CVE"/>
    <description>
    The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078099" comment="libotr-3.2.1-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078101" comment="libotr-devel-3.2.1-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078102" comment="libotr-tools-3.2.1-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078104" comment="libotr2-3.2.1-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3464</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3464" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081175" comment="rubygem-actionpack-2_3-2.3.14-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081176" comment="rubygem-actionpack-2_3-doc-2.3.14-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081177" comment="rubygem-actionpack-2_3-testsuite-2.3.14-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081178" comment="rubygem-activesupport-2_3-2.3.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081179" comment="rubygem-activesupport-2_3-doc-2.3.14-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3465</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3465" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081175" comment="rubygem-actionpack-2_3-2.3.14-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081176" comment="rubygem-actionpack-2_3-doc-2.3.14-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081177" comment="rubygem-actionpack-2_3-testsuite-2.3.14-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081178" comment="rubygem-activesupport-2_3-2.3.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081179" comment="rubygem-activesupport-2_3-doc-2.3.14-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3466</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3466" source="CVE"/>
    <description>
    GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080804" comment="gnome-keyring-3.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080807" comment="gnome-keyring-lang-3.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080808" comment="gnome-keyring-pam-3.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080809" comment="gnome-keyring-pam-32bit-3.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080812" comment="libgck-modules-gnome-keyring-3.4.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3479</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3479" source="CVE"/>
    <description>
    lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081258" comment="ddskk-20121010_14.4-283.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081259" comment="skkdic-20121010_14.4-283.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081260" comment="skkdic-extra-20121010_14.4-283.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081261" comment="emacs-w3-cvs-808.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081262" comment="emacs-24.2-15.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081265" comment="emacs-el-24.2-15.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081266" comment="emacs-info-24.2-15.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081267" comment="emacs-nox-24.2-15.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081268" comment="emacs-x11-24.2-15.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081269" comment="gnuplot-4.6.0-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081272" comment="gnuplot-doc-4.6.0-3.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3481</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3481" source="CVE"/>
    <description>
    Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081078" comment="gimp-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081079" comment="gimp-branding-upstream-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081082" comment="gimp-devel-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081084" comment="gimp-help-browser-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081086" comment="gimp-lang-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081087" comment="gimp-plugins-python-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081089" comment="libgimp-2_0-0-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081090" comment="libgimp-2_0-0-32bit-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081093" comment="libgimpui-2_0-0-2.8.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081094" comment="libgimpui-2_0-0-32bit-2.8.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3488</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488" source="CVE"/>
    <description>
    The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081232" comment="libecpg6-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081234" comment="libpq5-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081235" comment="libpq5-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081238" comment="postgresql-devel-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081239" comment="postgresql-devel-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081242" comment="postgresql-libs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081244" comment="postgresql-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081245" comment="postgresql-contrib-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081249" comment="postgresql-docs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081250" comment="postgresql-plperl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081252" comment="postgresql-plpython-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081254" comment="postgresql-pltcl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081256" comment="postgresql-server-9.1.5-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3489</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489" source="CVE"/>
    <description>
    The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081232" comment="libecpg6-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081234" comment="libpq5-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081235" comment="libpq5-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081238" comment="postgresql-devel-32bit-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081239" comment="postgresql-devel-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081242" comment="postgresql-libs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081244" comment="postgresql-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081245" comment="postgresql-contrib-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081249" comment="postgresql-docs-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081250" comment="postgresql-plperl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081252" comment="postgresql-plpython-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081254" comment="postgresql-pltcl-9.1.5-7.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081256" comment="postgresql-server-9.1.5-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3494</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494" source="CVE"/>
    <description>
    The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3495</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495" source="CVE"/>
    <description>
    The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3496</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496" source="CVE"/>
    <description>
    XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3497</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497" source="CVE"/>
    <description>
    (1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3498</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498" source="CVE"/>
    <description>
    PHYSDEVOP_map_pirq in Xen 4.1 and 4.2 and Citrix XenServer 6.0.2 and earlier allows local HVM guest OS kernels to cause a denial of service (host crash) and possibly read hypervisor or guest memory via vectors related to a missing range check of map-&gt;index.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3499</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079419" comment="apache2-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079422" comment="apache2-devel-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079423" comment="apache2-doc-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079424" comment="apache2-event-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079426" comment="apache2-example-pages-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079427" comment="apache2-itk-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079429" comment="apache2-prefork-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079431" comment="apache2-utils-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079433" comment="apache2-worker-2.2.22-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3500</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3500" source="CVE"/>
    <description>
    scripts/annotate-output.sh in devscripts before 2.12.2, as used in rpmdevtools before 8.3, allows local users to modify arbitrary files via a symlink attack on the temporary (1) standard output or (2) standard error output file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081210" comment="deb-1.16.3-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081213" comment="deb-devel-1.16.3-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081214" comment="deb-lang-1.16.3-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081215" comment="update-alternatives-1.16.3-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3505</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3505" source="CVE"/>
    <description>
    Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably.  bucket.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080470" comment="tinyproxy-1.8.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3507</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3507" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in program/steps/mail/func.inc in RoundCube Webmail before 0.8.0, when using the Larry skin, allows remote attackers to inject arbitrary web script or HTML via the email message subject.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080814" comment="roundcubemail-0.8.1-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3508</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3508" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in program/lib/washtml.php in Roundcube Webmail 0.8.0 allows remote attackers to inject arbitrary web script or HTML by using "javascript:" in an href attribute in the body of an HTML-formatted email.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080814" comment="roundcubemail-0.8.1-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
    <description>
    Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081112" comment="kvm-1.1.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081113" comment="xen-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081115" comment="xen-devel-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081116" comment="xen-kmp-default-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081118" comment="xen-kmp-desktop-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081120" comment="xen-kmp-pae-4.1.3_01_k3.4.6_2.10-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081122" comment="xen-libs-32bit-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081123" comment="xen-libs-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081126" comment="xen-tools-domU-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081128" comment="xen-doc-html-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081129" comment="xen-doc-pdf-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081130" comment="xen-tools-4.1.3_01-5.6.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081132" comment="qemu-1.1.1-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081135" comment="qemu-guest-agent-1.1.1-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081137" comment="qemu-linux-user-1.1.1-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081138" comment="qemu-tools-1.1.1-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3517</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3517" source="CVE"/>
    <description>
    Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080798" comment="tor-0.2.2.38-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3518</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3518" source="CVE"/>
    <description>
    The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080798" comment="tor-0.2.2.38-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3519</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3519" source="CVE"/>
    <description>
    routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080798" comment="tor-0.2.2.38-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3520</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3520" source="CVE"/>
    <description>
    The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081314" comment="kernel-debug-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081315" comment="kernel-debug-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081319" comment="kernel-debug-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081321" comment="kernel-default-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081322" comment="kernel-default-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081326" comment="kernel-default-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081328" comment="kernel-desktop-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081329" comment="kernel-desktop-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081333" comment="kernel-desktop-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081335" comment="kernel-docs-3.4.11-2.16.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081336" comment="kernel-ec2-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081337" comment="kernel-ec2-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081341" comment="kernel-ec2-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081343" comment="kernel-ec2-extra-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081345" comment="kernel-pae-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081346" comment="kernel-pae-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081350" comment="kernel-pae-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081352" comment="kernel-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081353" comment="kernel-source-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081354" comment="kernel-source-vanilla-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081355" comment="kernel-syms-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081356" comment="kernel-trace-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081357" comment="kernel-trace-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081361" comment="kernel-trace-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081363" comment="kernel-vanilla-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081366" comment="kernel-vanilla-devel-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081368" comment="kernel-xen-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081369" comment="kernel-xen-base-3.4.11-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081373" comment="kernel-xen-devel-3.4.11-2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3524</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524" source="CVE"/>
    <description>
    libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077821" comment="dbus-1-x11-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077824" comment="dbus-1-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077825" comment="dbus-1-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077829" comment="dbus-1-devel-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077830" comment="dbus-1-devel-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077831" comment="dbus-1-devel-doc-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077832" comment="libdbus-1-3-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077833" comment="libdbus-1-3-32bit-1.5.12-4.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081273" comment="dbus-1-x11-1.5.12-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081276" comment="dbus-1-1.5.12-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081277" comment="dbus-1-32bit-1.5.12-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081281" comment="dbus-1-devel-1.5.12-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081282" comment="dbus-1-devel-32bit-1.5.12-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081283" comment="dbus-1-devel-doc-1.5.12-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081284" comment="libdbus-1-3-1.5.12-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081285" comment="libdbus-1-3-32bit-1.5.12-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3535</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3535" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenJPEG 1.5.0 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted JPEG2000 file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081426" comment="libopenjpeg1-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081427" comment="libopenjpeg1-32bit-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081430" comment="openjpeg-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081433" comment="openjpeg-devel-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081434" comment="openjpeg-devel-32bit-1.5.0-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3544</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544" source="CVE"/>
    <description>
    Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090263" comment="tomcat-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090264" comment="tomcat-admin-webapps-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090265" comment="tomcat-docs-webapp-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090266" comment="tomcat-el-2_2-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090267" comment="tomcat-javadoc-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090268" comment="tomcat-jsp-2_2-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090269" comment="tomcat-jsvc-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090270" comment="tomcat-lib-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090271" comment="tomcat-servlet-3_0-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090272" comment="tomcat-webapps-7.0.27-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3546</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3546" source="CVE"/>
    <description>
    org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3547</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3547" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081180" comment="freeradius-server-2.1.12-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081183" comment="freeradius-server-devel-2.1.12-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081184" comment="freeradius-server-dialupadmin-2.1.12-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081185" comment="freeradius-server-doc-2.1.12-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081186" comment="freeradius-server-libs-2.1.12-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081188" comment="freeradius-server-utils-2.1.12-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3955</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955" source="CVE"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081221" comment="dhcp-4.2.4.P2-0.1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081222" comment="dhcp-client-4.2.4.P2-0.1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081226" comment="dhcp-devel-4.2.4.P2-0.1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081227" comment="dhcp-doc-4.2.4.P2-0.1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081228" comment="dhcp-relay-4.2.4.P2-0.1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081230" comment="dhcp-server-4.2.4.P2-0.1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
    <description>
    Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3965</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0 does not properly restrict navigation to the about:newtab page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers creation of a new tab and then a new window.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
    <description>
    Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3971</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971" source="CVE"/>
    <description>
    Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
    <description>
    The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3973</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973" source="CVE"/>
    <description>
    The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3975</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975" source="CVE"/>
    <description>
    The DOMParser component in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 loads subresources during parsing of text/html data within an extension, which allows remote attackers to obtain sensitive information by providing crafted data to privileged extension code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
    <description>
    The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080905" comment="MozillaFirefox-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080906" comment="MozillaFirefox-branding-upstream-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080907" comment="MozillaFirefox-buildsymbols-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080910" comment="MozillaFirefox-devel-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080911" comment="MozillaFirefox-translations-common-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080912" comment="MozillaFirefox-translations-other-15.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080913" comment="MozillaThunderbird-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080914" comment="MozillaThunderbird-buildsymbols-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080917" comment="MozillaThunderbird-devel-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080919" comment="MozillaThunderbird-translations-common-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080920" comment="MozillaThunderbird-translations-other-15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080921" comment="enigmail-1.4.4+15.0-49.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080923" comment="libfreebl3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080924" comment="libfreebl3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080927" comment="libsoftokn3-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080928" comment="libsoftokn3-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080931" comment="mozilla-nss-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080932" comment="mozilla-nss-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080933" comment="mozilla-nss-certs-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080934" comment="mozilla-nss-certs-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080940" comment="mozilla-nss-devel-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080941" comment="mozilla-nss-sysinit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080942" comment="mozilla-nss-sysinit-32bit-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080945" comment="mozilla-nss-tools-3.13.6-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080947" comment="seamonkey-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080950" comment="seamonkey-dom-inspector-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080951" comment="seamonkey-irc-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080952" comment="seamonkey-translations-common-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080953" comment="seamonkey-translations-other-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080954" comment="seamonkey-venkman-2.12-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080955" comment="mozilla-js-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080956" comment="mozilla-js-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080959" comment="xulrunner-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080960" comment="xulrunner-32bit-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080961" comment="xulrunner-buildsymbols-15.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080965" comment="xulrunner-devel-15.0-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3983</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3984</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3985</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3989</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
    <description>
    Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
    <description>
    The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
    <description>
    Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4191</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4191" source="CVE"/>
    <description>
    The mozilla::net::FailDelayManager::Lookup function in the WebSockets implementation in Mozilla Firefox before 16.0.1, Thunderbird before 16.0.1, and SeaMonkey before 2.13.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
    <description>
    Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081382" comment="MozillaFirefox-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081383" comment="MozillaFirefox-branding-upstream-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081384" comment="MozillaFirefox-buildsymbols-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081387" comment="MozillaFirefox-devel-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081388" comment="MozillaFirefox-translations-common-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081389" comment="MozillaFirefox-translations-other-16.0.1-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081390" comment="MozillaThunderbird-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081391" comment="MozillaThunderbird-buildsymbols-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081394" comment="MozillaThunderbird-devel-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081396" comment="MozillaThunderbird-translations-common-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081397" comment="MozillaThunderbird-translations-other-16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081398" comment="enigmail-1.4.5.+16.0.1-49.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081400" comment="mozilla-kde4-integration-0.6.4-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081403" comment="seamonkey-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081406" comment="seamonkey-dom-inspector-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081407" comment="seamonkey-irc-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081408" comment="seamonkey-translations-common-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081409" comment="seamonkey-translations-other-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081410" comment="seamonkey-venkman-2.13.1-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081411" comment="mozilla-js-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081412" comment="mozilla-js-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081415" comment="xulrunner-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081416" comment="xulrunner-32bit-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081417" comment="xulrunner-buildsymbols-16.0.1-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081421" comment="xulrunner-devel-16.0.1-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077905" comment="MozillaFirefox-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077906" comment="MozillaFirefox-branding-upstream-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077907" comment="MozillaFirefox-buildsymbols-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077910" comment="MozillaFirefox-devel-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077911" comment="MozillaFirefox-translations-common-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077912" comment="MozillaFirefox-translations-other-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077913" comment="MozillaThunderbird-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077914" comment="MozillaThunderbird-buildsymbols-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077917" comment="MozillaThunderbird-devel-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077919" comment="MozillaThunderbird-translations-common-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077920" comment="MozillaThunderbird-translations-other-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077921" comment="enigmail-1.4.5.+16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077923" comment="seamonkey-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077926" comment="seamonkey-dom-inspector-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077927" comment="seamonkey-irc-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077928" comment="seamonkey-translations-common-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077929" comment="seamonkey-translations-other-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077930" comment="seamonkey-venkman-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077931" comment="mozilla-js-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077932" comment="mozilla-js-32bit-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077935" comment="xulrunner-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077936" comment="xulrunner-32bit-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077937" comment="xulrunner-buildsymbols-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077941" comment="xulrunner-devel-16.0.2-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077905" comment="MozillaFirefox-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077906" comment="MozillaFirefox-branding-upstream-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077907" comment="MozillaFirefox-buildsymbols-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077910" comment="MozillaFirefox-devel-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077911" comment="MozillaFirefox-translations-common-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077912" comment="MozillaFirefox-translations-other-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077913" comment="MozillaThunderbird-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077914" comment="MozillaThunderbird-buildsymbols-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077917" comment="MozillaThunderbird-devel-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077919" comment="MozillaThunderbird-translations-common-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077920" comment="MozillaThunderbird-translations-other-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077921" comment="enigmail-1.4.5.+16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077923" comment="seamonkey-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077926" comment="seamonkey-dom-inspector-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077927" comment="seamonkey-irc-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077928" comment="seamonkey-translations-common-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077929" comment="seamonkey-translations-other-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077930" comment="seamonkey-venkman-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077931" comment="mozilla-js-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077932" comment="mozilla-js-32bit-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077935" comment="xulrunner-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077936" comment="xulrunner-32bit-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077937" comment="xulrunner-buildsymbols-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077941" comment="xulrunner-devel-16.0.2-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077905" comment="MozillaFirefox-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077906" comment="MozillaFirefox-branding-upstream-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077907" comment="MozillaFirefox-buildsymbols-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077910" comment="MozillaFirefox-devel-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077911" comment="MozillaFirefox-translations-common-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077912" comment="MozillaFirefox-translations-other-16.0.2-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077913" comment="MozillaThunderbird-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077914" comment="MozillaThunderbird-buildsymbols-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077917" comment="MozillaThunderbird-devel-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077919" comment="MozillaThunderbird-translations-common-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077920" comment="MozillaThunderbird-translations-other-16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077921" comment="enigmail-1.4.5.+16.0.2-49.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077923" comment="seamonkey-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077926" comment="seamonkey-dom-inspector-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077927" comment="seamonkey-irc-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077928" comment="seamonkey-translations-common-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077929" comment="seamonkey-translations-other-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077930" comment="seamonkey-venkman-2.13.2-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077931" comment="mozilla-js-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077932" comment="mozilla-js-32bit-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077935" comment="xulrunner-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077936" comment="xulrunner-32bit-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077937" comment="xulrunner-buildsymbols-16.0.2-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077941" comment="xulrunner-devel-16.0.2-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
    <description>
    The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
    <description>
    Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4203</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4203" source="CVE"/>
    <description>
    The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4204</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204" source="CVE"/>
    <description>
    The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4205</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
    <description>
    The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4208</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
    <description>
    The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
    <description>
    Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4219</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4219" source="CVE"/>
    <description>
    show_config_errors.php in phpMyAdmin 3.5.x before 3.5.2.1 allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message, related to lack of inclusion of the common.inc.php library file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080797" comment="phpMyAdmin-3.5.2.2-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4233</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4233" source="CVE"/>
    <description>
    LibreOffice 3.5.x before 3.5.7.2 and 3.6.x before 3.6.1, and OpenOffice.org (OOo), allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted (1) odt file to vcllo.dll, (2) ODG (Drawing document) file to svxcorelo.dll, (3) PolyPolygon record in a .wmf (Window Meta File) file embedded in a ppt (PowerPoint) file to tllo.dll, or (4) xls (Excel) file to scfiltlo.dll.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077958" comment="libreoffice-branding-upstream-3.5.4.13-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077959" comment="libreoffice-help-en-US-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077960" comment="libreoffice-help-cs-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077961" comment="libreoffice-help-da-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077962" comment="libreoffice-help-de-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077963" comment="libreoffice-help-en-GB-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077964" comment="libreoffice-help-group1-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077965" comment="libreoffice-help-en-ZA-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077966" comment="libreoffice-help-es-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077967" comment="libreoffice-help-et-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077968" comment="libreoffice-help-fr-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077969" comment="libreoffice-help-gl-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077970" comment="libreoffice-help-group2-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077971" comment="libreoffice-help-group3-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077972" comment="libreoffice-help-gu-IN-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077973" comment="libreoffice-help-hi-IN-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077974" comment="libreoffice-help-hu-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077975" comment="libreoffice-help-it-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077976" comment="libreoffice-help-ja-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077977" comment="libreoffice-help-km-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077978" comment="libreoffice-help-group4-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077979" comment="libreoffice-help-ko-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077980" comment="libreoffice-help-nl-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077981" comment="libreoffice-help-pl-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077982" comment="libreoffice-help-pt-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077983" comment="libreoffice-help-group5-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077984" comment="libreoffice-help-pt-BR-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077985" comment="libreoffice-help-ru-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077986" comment="libreoffice-help-sl-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077987" comment="libreoffice-help-sv-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077988" comment="libreoffice-help-zh-CN-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077989" comment="libreoffice-help-zh-TW-3.5.4.13-1.4.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077990" comment="libreoffice-icon-theme-crystal-3.5.4.13-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077991" comment="libreoffice-icon-theme-galaxy-3.5.4.13-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077992" comment="libreoffice-icon-theme-hicontrast-3.5.4.13-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077993" comment="libreoffice-icon-theme-oxygen-3.5.4.13-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077994" comment="libreoffice-icon-theme-tango-3.5.4.13-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077995" comment="libreoffice-icon-themes-3.5.4.13-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077996" comment="libreoffice-l10n-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077997" comment="libreoffice-l10n-af-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077998" comment="libreoffice-l10n-ar-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077999" comment="libreoffice-l10n-be-BY-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078000" comment="libreoffice-l10n-bg-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078001" comment="libreoffice-l10n-br-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078002" comment="libreoffice-l10n-ca-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078003" comment="libreoffice-l10n-cs-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078004" comment="libreoffice-l10n-cy-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078005" comment="libreoffice-l10n-da-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078006" comment="libreoffice-l10n-de-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078007" comment="libreoffice-l10n-el-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078008" comment="libreoffice-l10n-en-GB-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078009" comment="libreoffice-l10n-en-ZA-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078010" comment="libreoffice-l10n-es-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078011" comment="libreoffice-l10n-et-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078012" comment="libreoffice-l10n-fi-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078013" comment="libreoffice-l10n-fr-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078014" comment="libreoffice-l10n-ga-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078015" comment="libreoffice-l10n-gl-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078016" comment="libreoffice-l10n-gu-IN-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078017" comment="libreoffice-l10n-he-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078018" comment="libreoffice-l10n-hi-IN-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078019" comment="libreoffice-l10n-hr-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078020" comment="libreoffice-l10n-hu-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078021" comment="libreoffice-l10n-it-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078022" comment="libreoffice-l10n-ja-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078023" comment="libreoffice-l10n-ka-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078024" comment="libreoffice-l10n-km-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078025" comment="libreoffice-l10n-ko-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078026" comment="libreoffice-l10n-lt-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078027" comment="libreoffice-l10n-mk-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078028" comment="libreoffice-l10n-nb-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078029" comment="libreoffice-l10n-nl-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078030" comment="libreoffice-l10n-nn-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078031" comment="libreoffice-l10n-nr-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078032" comment="libreoffice-l10n-pa-IN-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078033" comment="libreoffice-l10n-pl-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078034" comment="libreoffice-l10n-pt-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078035" comment="libreoffice-l10n-pt-BR-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078036" comment="libreoffice-l10n-ru-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078037" comment="libreoffice-l10n-rw-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078038" comment="libreoffice-l10n-sh-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078039" comment="libreoffice-l10n-sk-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078040" comment="libreoffice-l10n-sl-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078041" comment="libreoffice-l10n-sr-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078042" comment="libreoffice-l10n-ss-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078043" comment="libreoffice-l10n-st-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078044" comment="libreoffice-l10n-sv-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078045" comment="libreoffice-l10n-tg-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078046" comment="libreoffice-l10n-th-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078047" comment="libreoffice-l10n-tr-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078048" comment="libreoffice-l10n-ts-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078049" comment="libreoffice-l10n-uk-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078050" comment="libreoffice-l10n-ve-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078051" comment="libreoffice-l10n-vi-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078052" comment="libreoffice-l10n-xh-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078053" comment="libreoffice-l10n-zh-CN-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078054" comment="libreoffice-l10n-zh-TW-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078055" comment="libreoffice-l10n-zu-3.5.4.13-1.4.8 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078056" comment="libreoffice-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078057" comment="libreoffice-base-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078059" comment="libreoffice-base-drivers-mysql-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078061" comment="libreoffice-base-drivers-postgresql-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078063" comment="libreoffice-base-extensions-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078064" comment="libreoffice-calc-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078066" comment="libreoffice-calc-extensions-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078069" comment="libreoffice-draw-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078070" comment="libreoffice-draw-extensions-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078072" comment="libreoffice-filters-optional-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078074" comment="libreoffice-gnome-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078076" comment="libreoffice-icon-themes-prebuilt-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078077" comment="libreoffice-impress-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078079" comment="libreoffice-impress-extensions-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078081" comment="libreoffice-kde-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078083" comment="libreoffice-kde4-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078085" comment="libreoffice-l10n-prebuilt-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078086" comment="libreoffice-mailmerge-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078087" comment="libreoffice-math-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078089" comment="libreoffice-officebean-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078091" comment="libreoffice-pyuno-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078093" comment="libreoffice-sdk-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078095" comment="libreoffice-sdk-doc-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078096" comment="libreoffice-writer-3.5.4.13-1.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078098" comment="libreoffice-writer-extensions-3.5.4.13-1.4.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081193" comment="bind-9.9.1P3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081194" comment="bind-chrootenv-9.9.1P3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081197" comment="bind-devel-9.9.1P3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081198" comment="bind-doc-9.9.1P3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081199" comment="bind-libs-32bit-9.9.1P3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081200" comment="bind-libs-9.9.1P3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081203" comment="bind-lwresd-9.9.1P3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081205" comment="bind-utils-9.9.1P3-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4286</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4286" source="CVE"/>
    <description>
    The pcapng_read_packet_block function in wiretap/pcapng.c in the pcap-ng file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted pcap-ng file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4287</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4287" source="CVE"/>
    <description>
    epan/dissectors/packet-mongo.c in the MongoDB dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a small value for a BSON document length.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
    <description>
    Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
    <description>
    epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
    <description>
    The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
    <description>
    The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
    <description>
    The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
    <description>
    plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4294</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4294" source="CVE"/>
    <description>
    Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4295</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4295" source="CVE"/>
    <description>
    Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
    <description>
    Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4297</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4297" source="CVE"/>
    <description>
    Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4298</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4298" source="CVE"/>
    <description>
    Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080763" comment="wireshark-1.8.2-1.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080766" comment="wireshark-devel-1.8.2-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4345</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4345" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Database Structure page in phpMyAdmin 3.4.x before 3.4.11.1 and 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) a crafted table name during table creation, or a (2) Empty link or (3) Drop link for a crafted table name.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080797" comment="phpMyAdmin-3.5.2.2-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4409</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4409" source="CVE"/>
    <description>
    Stack-based buffer overflow in the check_file_head function in extra.c in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to execute arbitrary code via an encrypted file with a crafted header containing long salt data that is not properly handled during decryption.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081207" comment="mcrypt-2.6.8-24.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
    <description>
    The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4414</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4414" source="CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log.  NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078384" comment="libmariadbclient18-32bit-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078385" comment="libmariadbclient18-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078388" comment="libmariadbclient_r18-32bit-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078389" comment="libmariadbclient_r18-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078390" comment="mariadb-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078391" comment="mariadb-bench-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078393" comment="mariadb-client-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078395" comment="mariadb-debug-version-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078399" comment="mariadb-errormessages-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078400" comment="mariadb-test-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078402" comment="mariadb-tools-5.5.28a-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4416</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4416" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4419</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4419" source="CVE"/>
    <description>
    The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081218" comment="tor-0.2.2.39-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4431</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4431" source="CVE"/>
    <description>
    org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4432</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4432" source="CVE"/>
    <description>
    Use-after-free vulnerability in opngreduc.c in OptiPNG Hg and 0.7.x before 0.7.3 might allow remote attackers to execute arbitrary code via unspecified vectors related to "palette reduction."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081375" comment="optipng-0.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4445</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4445" source="CVE"/>
    <description>
    Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081423" comment="hostapd-1.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4447</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447" source="CVE"/>
    <description>
    Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081484" comment="libtiff-devel-32bit-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081485" comment="libtiff-devel-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081486" comment="libtiff5-32bit-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081487" comment="libtiff5-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081490" comment="tiff-4.0.2-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4464</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4464" source="CVE"/>
    <description>
    Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466.  NOTE: this issue might exist because of a CVE-2011-1005 regression.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077943" comment="ruby19-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077946" comment="ruby19-devel-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077947" comment="ruby19-doc-ri-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077948" comment="ruby19-tk-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078980" comment="ruby19-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078983" comment="ruby19-devel-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078984" comment="ruby19-devel-extra-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078985" comment="ruby19-doc-ri-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078986" comment="ruby19-tk-1.9.3.p385-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4465</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4465" source="CVE"/>
    <description>
    Heap-based buffer overflow in the substr function in parsing.c in cgit 0.9.0.3 and earlier allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via an empty username in the "Author" field in a commit.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077902" comment="cgit-0.9.0.2-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4466</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4466" source="CVE"/>
    <description>
    Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077943" comment="ruby19-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077946" comment="ruby19-devel-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077947" comment="ruby19-doc-ri-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077948" comment="ruby19-tk-1.9.3.p194-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078980" comment="ruby19-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078983" comment="ruby19-devel-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078984" comment="ruby19-devel-extra-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078985" comment="ruby19-doc-ri-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078986" comment="ruby19-tk-1.9.3.p385-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4504</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4504" source="CVE"/>
    <description>
    Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081458" comment="libproxy-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081460" comment="libproxy-devel-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081461" comment="libproxy-sharp-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081462" comment="libproxy-tools-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081464" comment="libproxy1-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081465" comment="libproxy1-32bit-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081468" comment="perl-Net-Libproxy-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081470" comment="python-libproxy-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081471" comment="libproxy-plugins-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081473" comment="libproxy1-config-gnome3-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081475" comment="libproxy1-config-kde4-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081477" comment="libproxy1-networkmanager-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081479" comment="libproxy1-pacrunner-webkit-0.4.7-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4505</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505" source="CVE"/>
    <description>
    Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081458" comment="libproxy-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081460" comment="libproxy-devel-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081461" comment="libproxy-sharp-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081462" comment="libproxy-tools-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081464" comment="libproxy1-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081465" comment="libproxy1-32bit-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081468" comment="perl-Net-Libproxy-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081470" comment="python-libproxy-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081471" comment="libproxy-plugins-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081473" comment="libproxy1-config-gnome3-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081475" comment="libproxy1-config-kde4-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081477" comment="libproxy1-networkmanager-0.4.7-14.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081479" comment="libproxy1-pacrunner-webkit-0.4.7-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4507</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4507" source="CVE"/>
    <description>
    The strchr function in procmime.c in Claws Mail (aka claws-mail) 3.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted email.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077836" comment="claws-mail-3.8.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077839" comment="claws-mail-devel-3.8.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077840" comment="claws-mail-lang-3.8.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4512</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078136" comment="kdelibs4-apidocs-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078137" comment="kdelibs4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078138" comment="kdelibs4-branding-upstream-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078139" comment="kdelibs4-core-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078143" comment="kdelibs4-doc-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078145" comment="libkde4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078146" comment="libkde4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078149" comment="libkde4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078150" comment="libkdecore4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078151" comment="libkdecore4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078154" comment="libkdecore4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078156" comment="libksuseinstall-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078157" comment="libksuseinstall1-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078158" comment="libksuseinstall1-4.8.5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4513</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513" source="CVE"/>
    <description>
    khtml/imload/scaledimageplane.h in Konqueror in KDE 4.7.3 allows remote attackers to cause a denial of service (crash) and possibly read memory via large canvas dimensions, which leads to an unexpected sign extension and a heap-based buffer over-read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078136" comment="kdelibs4-apidocs-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078137" comment="kdelibs4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078138" comment="kdelibs4-branding-upstream-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078139" comment="kdelibs4-core-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078143" comment="kdelibs4-doc-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078145" comment="libkde4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078146" comment="libkde4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078149" comment="libkde4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078150" comment="libkdecore4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078151" comment="libkdecore4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078154" comment="libkdecore4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078156" comment="libksuseinstall-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078157" comment="libksuseinstall1-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078158" comment="libksuseinstall1-4.8.5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4514</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4514" source="CVE"/>
    <description>
    rendering/render_replaced.cpp in Konqueror in KDE before 4.9.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078136" comment="kdelibs4-apidocs-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078137" comment="kdelibs4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078138" comment="kdelibs4-branding-upstream-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078139" comment="kdelibs4-core-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078143" comment="kdelibs4-doc-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078145" comment="libkde4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078146" comment="libkde4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078149" comment="libkde4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078150" comment="libkdecore4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078151" comment="libkdecore4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078154" comment="libkdecore4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078156" comment="libksuseinstall-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078157" comment="libksuseinstall1-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078158" comment="libksuseinstall1-4.8.5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4515</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515" source="CVE"/>
    <description>
    Use-after-free vulnerability in khtml/rendering/render_replaced.cpp in Konqueror in KDE 4.7.3, when the context menu is shown, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by accessing an iframe when it is being updated.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078136" comment="kdelibs4-apidocs-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078137" comment="kdelibs4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078138" comment="kdelibs4-branding-upstream-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078139" comment="kdelibs4-core-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078143" comment="kdelibs4-doc-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078145" comment="libkde4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078146" comment="libkde4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078149" comment="libkde4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078150" comment="libkdecore4-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078151" comment="libkdecore4-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078154" comment="libkdecore4-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078156" comment="libksuseinstall-devel-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078157" comment="libksuseinstall1-32bit-4.8.5-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078158" comment="libksuseinstall1-4.8.5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4520</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4520" source="CVE"/>
    <description>
    The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4522</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4522" source="CVE"/>
    <description>
    The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078980" comment="ruby19-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078983" comment="ruby19-devel-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078984" comment="ruby19-devel-extra-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078985" comment="ruby19-doc-ri-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078986" comment="ruby19-tk-1.9.3.p385-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4527</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4527" source="CVE"/>
    <description>
    Stack-based buffer overflow in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file name.  NOTE: it is not clear whether this is a vulnerability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077950" comment="mcrypt-2.6.8-24.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4528</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528" source="CVE"/>
    <description>
    The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089867" comment="apache2-mod_security2-2.7.5-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4534</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4534" source="CVE"/>
    <description>
    org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078448" comment="tomcat-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078449" comment="tomcat-admin-webapps-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078450" comment="tomcat-docs-webapp-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078451" comment="tomcat-el-2_2-api-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078452" comment="tomcat-javadoc-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078453" comment="tomcat-jsp-2_2-api-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078454" comment="tomcat-jsvc-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078455" comment="tomcat-lib-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078456" comment="tomcat-servlet-3_0-api-7.0.27-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078457" comment="tomcat-webapps-7.0.27-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
    <description>
    The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
    <description>
    The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
    <description>
    Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4540</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540" source="CVE"/>
    <description>
    Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078132" comment="icedtea-web-1.3.1-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078135" comment="icedtea-web-javadoc-1.3.1-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090792" comment="icedtea-web-1.4.1-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090795" comment="icedtea-web-javadoc-1.4.1-1.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
    <description>
    The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078113" comment="xen-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078115" comment="xen-devel-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078116" comment="xen-kmp-default-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078118" comment="xen-kmp-desktop-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078120" comment="xen-kmp-pae-4.1.3_04_k3.4.11_2.16-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078122" comment="xen-libs-32bit-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078123" comment="xen-libs-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078126" comment="xen-tools-domU-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078128" comment="xen-doc-html-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078129" comment="xen-doc-pdf-4.1.3_04-5.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078130" comment="xen-tools-4.1.3_04-5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4548</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4548" source="CVE"/>
    <description>
    Argument injection vulnerability in syntax-highlighting.sh in cgit 9.0.3 and earlier allows remote authenticated users with permissions to add files to execute arbitrary commands via the --plug-in argument to the highlight command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077902" comment="cgit-0.9.0.2-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4552</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4552" source="CVE"/>
    <description>
    Stack-based buffer overflow in the error function in ssg/ssgParser.cxx in PLIB 1.8.5 allows remote attackers to execute arbitrary code via a crafted 3d model file that triggers a long error message, as demonstrated by a .ase file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077953" comment="plib-1.8.5-76.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077956" comment="plib-devel-1.8.5-76.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4558</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079419" comment="apache2-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079422" comment="apache2-devel-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079423" comment="apache2-doc-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079424" comment="apache2-event-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079426" comment="apache2-example-pages-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079427" comment="apache2-itk-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079429" comment="apache2-prefork-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079431" comment="apache2-utils-2.2.22-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079433" comment="apache2-worker-2.2.22-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4559</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559" source="CVE"/>
    <description>
    Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078235" comment="libssh-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078237" comment="libssh-devel-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078238" comment="libssh-devel-doc-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078239" comment="libssh4-0.5.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4560</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560" source="CVE"/>
    <description>
    Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078235" comment="libssh-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078237" comment="libssh-devel-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078238" comment="libssh-devel-doc-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078239" comment="libssh4-0.5.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4561</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561" source="CVE"/>
    <description>
    The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers cause a denial of service (crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078235" comment="libssh-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078237" comment="libssh-devel-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078238" comment="libssh-devel-doc-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078239" comment="libssh4-0.5.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4562</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562" source="CVE"/>
    <description>
    Multiple integer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (infinite loop or crash) and possibly execute arbitrary code via unspecified vectors, which triggers a buffer overflow, infinite loop, or possibly some other unspecified vulnerabilities.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078235" comment="libssh-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078237" comment="libssh-devel-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078238" comment="libssh-devel-doc-0.5.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078239" comment="libssh4-0.5.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
    <description>
    ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081484" comment="libtiff-devel-32bit-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081485" comment="libtiff-devel-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081486" comment="libtiff5-32bit-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081487" comment="libtiff5-4.0.2-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081490" comment="tiff-4.0.2-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4600</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4600" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.14, 3.0.x before 3.0.16, and 3.1.x before 3.1.10, when Firefox or Opera is used, allows remote attackers to inject arbitrary web script or HTML via an e-mail message body with nested HTML tags.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081190" comment="otrs-3.1.10-20.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081191" comment="otrs-doc-3.1.10-20.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081192" comment="otrs-itsm-3.1.6-20.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4681</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681" source="CVE"/>
    <description>
    Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081140" comment="java-1_7_0-openjdk-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081143" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081145" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081147" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081148" comment="java-1_7_0-openjdk-src-1.7.0.6-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4751</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4751" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.15, 3.0.x before 3.0.17, and 3.1.x before 3.1.11 allows remote attackers to inject arbitrary web script or HTML via an e-mail message body with whitespace before a javascript: URL in the SRC attribute of an element, as demonstrated by an IFRAME element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081481" comment="otrs-3.1.11-20.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081482" comment="otrs-doc-3.1.11-20.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081483" comment="otrs-itsm-3.1.6-20.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4922</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4922" source="CVE"/>
    <description>
    The tor_timegm function in common/util.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.22-rc, does not properly validate time values, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a different vulnerability than CVE-2012-4419.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081218" comment="tor-0.2.2.39-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077841" comment="libqt4-devel-doc-4.8.1-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077842" comment="libqt4-devel-doc-data-4.8.1-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077845" comment="qt4-x11-tools-4.8.1-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077847" comment="libqt4-sql-mysql-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077848" comment="libqt4-sql-mysql-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077851" comment="libqt4-sql-plugins-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077853" comment="libqt4-sql-postgresql-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077854" comment="libqt4-sql-postgresql-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077857" comment="libqt4-sql-unixODBC-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077858" comment="libqt4-sql-unixODBC-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077861" comment="libqt4-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077862" comment="libqt4-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077866" comment="libqt4-devel-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077868" comment="libqt4-private-headers-devel-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077869" comment="libqt4-qt3support-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077870" comment="libqt4-qt3support-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077873" comment="libqt4-sql-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077874" comment="libqt4-sql-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077877" comment="libqt4-sql-sqlite-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077878" comment="libqt4-sql-sqlite-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077881" comment="libqt4-x11-32bit-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077882" comment="libqt4-x11-4.8.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091201" comment="libopenssl-devel-1.0.1e-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091202" comment="libopenssl-devel-32bit-1.0.1e-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091203" comment="libopenssl1_0_0-1.0.1e-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091204" comment="libopenssl1_0_0-32bit-1.0.1e-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091205" comment="openssl-1.0.1e-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091206" comment="openssl-doc-1.0.1e-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5068</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5069</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5070</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5071</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5073</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5074</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality and integrity, related to JAX-WS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5075</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5076</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5077</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5084</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5085</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5085" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking.  NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5086</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5087</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5088</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5089</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077885" comment="java-1_7_0-openjdk-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077888" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077890" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077892" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077893" comment="java-1_7_0-openjdk-src-1.7.0.6-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5130</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5130" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 23.0.1271.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5131</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5131" source="CVE"/>
    <description>
    Google Chrome before 23.0.1271.91 on Mac OS X does not properly mitigate improper rendering behavior in the Intel GPU driver, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5132</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5132" source="CVE"/>
    <description>
    Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service (application crash) via a response with chunked transfer coding.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5133</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5133" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
    <description>
    Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078292" comment="libxml2-2-2.7.8+git20120223-8.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078293" comment="libxml2-2-32bit-2.7.8+git20120223-8.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078296" comment="libxml2-2.7.8+git20120223-8.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078298" comment="libxml2-devel-2.7.8+git20120223-8.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078299" comment="libxml2-devel-32bit-2.7.8+git20120223-8.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078300" comment="libxml2-doc-2.7.8+git20120223-8.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078301" comment="libxml2-tools-2.7.8+git20120223-8.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078303" comment="python-libxml2-2.7.8+git20120223-8.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5135</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5135" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5136</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5136" source="CVE"/>
    <description>
    Google Chrome before 23.0.1271.91 does not properly perform a cast of an unspecified variable during handling of the INPUT element, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted HTML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5137</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5137" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Media Source API.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5138</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5138" source="CVE"/>
    <description>
    Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078278" comment="chromedriver-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078280" comment="chromium-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078283" comment="chromium-desktop-gnome-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078284" comment="chromium-desktop-kde-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078285" comment="chromium-ffmpegsumo-25.0.1343.0-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078287" comment="chromium-suid-helper-25.0.1343.0-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5139</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5139" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to visibility events.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078339" comment="chromedriver-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078341" comment="chromium-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078344" comment="chromium-desktop-gnome-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078345" comment="chromium-desktop-kde-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078346" comment="chromium-ffmpegsumo-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078348" comment="chromium-suid-helper-25.0.1362.0-1.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5140</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5140" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the URL loader.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078339" comment="chromedriver-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078341" comment="chromium-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078344" comment="chromium-desktop-gnome-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078345" comment="chromium-desktop-kde-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078346" comment="chromium-ffmpegsumo-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078348" comment="chromium-suid-helper-25.0.1362.0-1.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5141</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5141" source="CVE"/>
    <description>
    Google Chrome before 23.0.1271.97 does not properly restrict instantiation of the Chromoting client plug-in, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078339" comment="chromedriver-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078341" comment="chromium-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078344" comment="chromium-desktop-gnome-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078345" comment="chromium-desktop-kde-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078346" comment="chromium-ffmpegsumo-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078348" comment="chromium-suid-helper-25.0.1362.0-1.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5142</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5142" source="CVE"/>
    <description>
    Google Chrome before 23.0.1271.97 does not properly handle history navigation, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078339" comment="chromedriver-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078341" comment="chromium-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078344" comment="chromium-desktop-gnome-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078345" comment="chromium-desktop-kde-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078346" comment="chromium-ffmpegsumo-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078348" comment="chromium-suid-helper-25.0.1362.0-1.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5143</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5143" source="CVE"/>
    <description>
    Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078339" comment="chromedriver-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078341" comment="chromium-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078344" comment="chromium-desktop-gnome-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078345" comment="chromium-desktop-kde-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078346" comment="chromium-ffmpegsumo-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078348" comment="chromium-suid-helper-25.0.1362.0-1.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5144</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5144" source="CVE"/>
    <description>
    Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to "an off-by-one overwrite when switching to LTP profile from MAIN."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078339" comment="chromedriver-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078341" comment="chromium-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078344" comment="chromium-desktop-gnome-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078345" comment="chromium-desktop-kde-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078346" comment="chromium-ffmpegsumo-25.0.1362.0-1.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078348" comment="chromium-suid-helper-25.0.1362.0-1.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5145</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5145" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5146</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5146" source="CVE"/>
    <description>
    Google Chrome before 24.0.1312.52 allows remote attackers to bypass the Same Origin Policy via a malformed URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5147</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5147" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5148</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5148" source="CVE"/>
    <description>
    The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5149</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5149" source="CVE"/>
    <description>
    Integer overflow in the audio IPC layer in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5150</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5150" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving seek operations on video data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5152</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5152" source="CVE"/>
    <description>
    Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving seek operations on video data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5153</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5153" source="CVE"/>
    <description>
    Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to stack memory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5154</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5154" source="CVE"/>
    <description>
    Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081444" comment="bind-9.9.1P4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081445" comment="bind-chrootenv-9.9.1P4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081448" comment="bind-devel-9.9.1P4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081449" comment="bind-doc-9.9.1P4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081450" comment="bind-libs-32bit-9.9.1P4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081451" comment="bind-libs-9.9.1P4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081454" comment="bind-lwresd-9.9.1P4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081456" comment="bind-utils-9.9.1P4-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5339</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5339" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted name of (1) an event, (2) a procedure, or (3) a trigger.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077957" comment="phpMyAdmin-3.5.3-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5368</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5368" source="CVE"/>
    <description>
    phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmyadmin.net without SSL, which allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks by modifying this code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077957" comment="phpMyAdmin-3.5.3-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5371</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5371" source="CVE"/>
    <description>
    Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078980" comment="ruby19-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078983" comment="ruby19-devel-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078984" comment="ruby19-devel-extra-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078985" comment="ruby19-doc-ri-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078986" comment="ruby19-tk-1.9.3.p385-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5374</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5374" source="CVE"/>
    <description>
    The CRC32C feature in the Btrfs implementation in the Linux kernel before 3.8-rc1 allows local users to cause a denial of service (extended runtime of kernel code) by creating many different files whose names are associated with the same CRC32C hash value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079093" comment="kernel-debug-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079094" comment="kernel-debug-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079098" comment="kernel-debug-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079100" comment="kernel-default-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079101" comment="kernel-default-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079105" comment="kernel-default-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079107" comment="kernel-desktop-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079108" comment="kernel-desktop-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079112" comment="kernel-desktop-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079114" comment="kernel-docs-3.4.33-2.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079115" comment="kernel-ec2-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079116" comment="kernel-ec2-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079120" comment="kernel-ec2-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079122" comment="kernel-ec2-extra-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079124" comment="kernel-pae-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079125" comment="kernel-pae-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079129" comment="kernel-pae-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079131" comment="kernel-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079132" comment="kernel-source-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079133" comment="kernel-source-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079134" comment="kernel-syms-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079135" comment="kernel-trace-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079136" comment="kernel-trace-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079140" comment="kernel-trace-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079142" comment="kernel-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079145" comment="kernel-vanilla-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079147" comment="kernel-xen-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079148" comment="kernel-xen-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079152" comment="kernel-xen-devel-3.4.33-2.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5510</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510" source="CVE"/>
    <description>
    Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078306" comment="xen-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078308" comment="xen-devel-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078309" comment="xen-kmp-default-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078311" comment="xen-kmp-desktop-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078313" comment="xen-kmp-pae-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078315" comment="xen-libs-32bit-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078316" comment="xen-libs-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078319" comment="xen-tools-domU-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078321" comment="xen-doc-html-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078322" comment="xen-doc-pdf-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078323" comment="xen-tools-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5511</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511" source="CVE"/>
    <description>
    Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078306" comment="xen-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078308" comment="xen-devel-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078309" comment="xen-kmp-default-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078311" comment="xen-kmp-desktop-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078313" comment="xen-kmp-pae-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078315" comment="xen-libs-32bit-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078316" comment="xen-libs-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078319" comment="xen-tools-domU-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078321" comment="xen-doc-html-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078322" comment="xen-doc-pdf-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078323" comment="xen-tools-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5512</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5512" source="CVE"/>
    <description>
    Array index error in the HVMOP_set_mem_access handler in Xen 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) or obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078306" comment="xen-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078308" comment="xen-devel-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078309" comment="xen-kmp-default-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078311" comment="xen-kmp-desktop-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078313" comment="xen-kmp-pae-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078315" comment="xen-libs-32bit-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078316" comment="xen-libs-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078319" comment="xen-tools-domU-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078321" comment="xen-doc-html-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078322" comment="xen-doc-pdf-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078323" comment="xen-tools-4.1.3_06-5.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
    <description>
    The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078306" comment="xen-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078308" comment="xen-devel-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078309" comment="xen-kmp-default-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078311" comment="xen-kmp-desktop-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078313" comment="xen-kmp-pae-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078315" comment="xen-libs-32bit-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078316" comment="xen-libs-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078319" comment="xen-tools-domU-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078321" comment="xen-doc-html-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078322" comment="xen-doc-pdf-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078323" comment="xen-tools-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5514</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514" source="CVE"/>
    <description>
    The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078306" comment="xen-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078308" comment="xen-devel-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078309" comment="xen-kmp-default-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078311" comment="xen-kmp-desktop-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078313" comment="xen-kmp-pae-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078315" comment="xen-libs-32bit-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078316" comment="xen-libs-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078319" comment="xen-tools-domU-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078321" comment="xen-doc-html-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078322" comment="xen-doc-pdf-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078323" comment="xen-tools-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
    <description>
    The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078306" comment="xen-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078308" comment="xen-devel-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078309" comment="xen-kmp-default-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078311" comment="xen-kmp-desktop-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078313" comment="xen-kmp-pae-4.1.3_06_k3.4.11_2.16-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078315" comment="xen-libs-32bit-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078316" comment="xen-libs-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078319" comment="xen-tools-domU-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078321" comment="xen-doc-html-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078322" comment="xen-doc-pdf-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078323" comment="xen-tools-4.1.3_06-5.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5526</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5526" source="CVE"/>
    <description>
    CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079256" comment="perl-32bit-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079257" comment="perl-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079258" comment="perl-base-32bit-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079259" comment="perl-base-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079265" comment="perl-doc-5.16.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5533</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5533" source="CVE"/>
    <description>
    The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078218" comment="lighttpd-1.4.31-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078221" comment="lighttpd-mod_cml-1.4.31-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078223" comment="lighttpd-mod_geoip-1.4.31-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078225" comment="lighttpd-mod_magnet-1.4.31-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078227" comment="lighttpd-mod_mysql_vhost-1.4.31-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078229" comment="lighttpd-mod_rrdtool-1.4.31-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078231" comment="lighttpd-mod_trigger_b4_dl-1.4.31-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078233" comment="lighttpd-mod_webdav-1.4.31-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5534</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5534" source="CVE"/>
    <description>
    The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078161" comment="weechat-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078162" comment="weechat-aspell-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078166" comment="weechat-devel-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078167" comment="weechat-guile-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078169" comment="weechat-lang-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078170" comment="weechat-lua-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078172" comment="weechat-perl-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078174" comment="weechat-python-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078176" comment="weechat-ruby-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078178" comment="weechat-tcl-0.3.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5565</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5565" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078244" comment="horde4-imp-5.0.24-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5566</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5566" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078255" comment="horde4-kronolith-3.0.18-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5567</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5567" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078255" comment="horde4-kronolith-3.0.18-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5568</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5568" source="CVE"/>
    <description>
    Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5573</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5573" source="CVE"/>
    <description>
    The connection_edge_process_relay_cell function in or/relay.c in Tor before 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote attackers to cause a denial of service (memory consumption or excessive cell reception rate) or bypass intended flow-control restrictions via a RELAY_COMMAND_SENDME command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078275" comment="tor-0.2.2.39-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5576</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078256" comment="gimp-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078257" comment="gimp-branding-upstream-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078260" comment="gimp-devel-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078262" comment="gimp-help-browser-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078264" comment="gimp-lang-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078265" comment="gimp-plugins-python-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078267" comment="libgimp-2_0-0-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078268" comment="libgimp-2_0-0-32bit-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078271" comment="libgimpui-2_0-0-2.8.0-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078272" comment="libgimpui-2_0-0-32bit-2.8.0-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5592</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5592" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6052.  Reason: This candidate is a reservation duplicate of CVE-2012-6052.  Notes: All CVE users should reference CVE-2012-6052 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5593</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5593" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6053.  Reason: This candidate is a reservation duplicate of CVE-2012-6053.  Notes: All CVE users should reference CVE-2012-6053 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5596</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5596" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6057.  Reason: This candidate is a reservation duplicate of CVE-2012-6057.  Notes: All CVE users should reference CVE-2012-6057 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5597</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6059.  Reason: This candidate is a reservation duplicate of CVE-2012-6059.  Notes: All CVE users should reference CVE-2012-6059 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5598</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6060.  Reason: This candidate is a reservation duplicate of CVE-2012-6060.  Notes: All CVE users should reference CVE-2012-6060 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5599</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6061.  Reason: This candidate is a reservation duplicate of CVE-2012-6061.  Notes: All CVE users should reference CVE-2012-6061 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5600</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason: This candidate is a reservation duplicate of CVE-2012-6062.  Notes: All CVE users should reference CVE-2012-6062 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5601</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5601" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6055.  Reason: This candidate is a reservation duplicate of CVE-2012-6055.  Notes: All CVE users should reference CVE-2012-6055 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5602</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5602" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078109" comment="wireshark-1.8.4-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078112" comment="wireshark-devel-1.8.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5611</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611" source="CVE"/>
    <description>
    Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078360" comment="libmysqlclient-devel-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078361" comment="libmysqlclient18-32bit-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078362" comment="libmysqlclient18-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078365" comment="libmysqlclient_r18-32bit-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078366" comment="libmysqlclient_r18-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078367" comment="libmysqld-devel-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078368" comment="libmysqld18-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078370" comment="mysql-community-server-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078371" comment="mysql-community-server-bench-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078373" comment="mysql-community-server-client-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078375" comment="mysql-community-server-debug-version-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078379" comment="mysql-community-server-errormessages-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078380" comment="mysql-community-server-test-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078382" comment="mysql-community-server-tools-5.5.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078384" comment="libmariadbclient18-32bit-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078385" comment="libmariadbclient18-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078388" comment="libmariadbclient_r18-32bit-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078389" comment="libmariadbclient_r18-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078390" comment="mariadb-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078391" comment="mariadb-bench-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078393" comment="mariadb-client-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078395" comment="mariadb-debug-version-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078399" comment="mariadb-errormessages-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078400" comment="mariadb-test-5.5.28a-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078402" comment="mariadb-tools-5.5.28a-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5624</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5624" source="CVE"/>
    <description>
    The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078404" comment="libqt4-devel-doc-4.8.1-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078405" comment="libqt4-devel-doc-data-4.8.1-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078408" comment="qt4-x11-tools-4.8.1-2.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078410" comment="libqt4-sql-mysql-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078411" comment="libqt4-sql-mysql-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078414" comment="libqt4-sql-plugins-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078416" comment="libqt4-sql-postgresql-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078417" comment="libqt4-sql-postgresql-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078420" comment="libqt4-sql-unixODBC-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078421" comment="libqt4-sql-unixODBC-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078424" comment="libqt4-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078425" comment="libqt4-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078429" comment="libqt4-devel-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078431" comment="libqt4-private-headers-devel-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078432" comment="libqt4-qt3support-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078433" comment="libqt4-qt3support-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078436" comment="libqt4-sql-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078437" comment="libqt4-sql-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078440" comment="libqt4-sql-sqlite-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078441" comment="libqt4-sql-sqlite-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078444" comment="libqt4-x11-32bit-4.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078445" comment="libqt4-x11-4.8.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5634</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634" source="CVE"/>
    <description>
    Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5642</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5642" source="CVE"/>
    <description>
    server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079374" comment="fail2ban-0.8.6-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5643</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643" source="CVE"/>
    <description>
    Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078567" comment="squid3-3.1.23-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090449" comment="squid-2.7.STABLE9-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5656</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5656" source="CVE"/>
    <description>
    The rasterization process in Inkscape before 0.48.4 allows local users to read arbitrary files via an external entity in a SVG file, aka an XML external entity (XXE) injection attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078805" comment="inkscape-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078808" comment="inkscape-extensions-dia-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078809" comment="inkscape-extensions-extra-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078810" comment="inkscape-extensions-fig-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078811" comment="inkscape-extensions-gimp-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078812" comment="inkscape-extensions-skencil-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078813" comment="inkscape-lang-0.48.3.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5664</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5664" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6496, CVE-2012-6497.  Reason: this candidate was intended for one issue, but the candidate was publicly used to label concerns about multiple products.  Notes: All CVE users should consult CVE-2012-6496 and CVE-2012-6497 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078705" comment="rubygem-actionmailer-2_3-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078706" comment="rubygem-actionmailer-2_3-doc-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078707" comment="rubygem-actionmailer-2_3-testsuite-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078708" comment="rubygem-actionmailer-3_2-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078709" comment="rubygem-actionmailer-3_2-doc-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078710" comment="rubygem-actionmailer-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078711" comment="rubygem-actionpack-2_3-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078712" comment="rubygem-actionpack-2_3-doc-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078713" comment="rubygem-actionpack-2_3-testsuite-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078714" comment="rubygem-actionpack-3_2-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078715" comment="rubygem-actionpack-3_2-doc-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078716" comment="rubygem-actionpack-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078717" comment="rubygem-activemodel-3_2-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078718" comment="rubygem-activemodel-3_2-doc-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078719" comment="rubygem-activerecord-2_3-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078720" comment="rubygem-activerecord-2_3-doc-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078721" comment="rubygem-activerecord-2_3-testsuite-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078722" comment="rubygem-activerecord-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078723" comment="rubygem-activerecord-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078724" comment="rubygem-activerecord-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078725" comment="rubygem-activeresource-2_3-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078726" comment="rubygem-activeresource-2_3-doc-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078727" comment="rubygem-activeresource-2_3-testsuite-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078728" comment="rubygem-activeresource-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078729" comment="rubygem-activeresource-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078730" comment="rubygem-activeresource-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078731" comment="rubygem-activesupport-2_3-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078732" comment="rubygem-activesupport-2_3-doc-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078733" comment="rubygem-activesupport-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078734" comment="rubygem-activesupport-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078735" comment="rubygem-activesupport-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078736" comment="rubygem-rack-1_1-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078737" comment="rubygem-rack-1_1-doc-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078738" comment="rubygem-rack-1_1-testsuite-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078739" comment="rubygem-rack-1_2-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078740" comment="rubygem-rack-1_2-doc-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078741" comment="rubygem-rack-1_2-testsuite-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078742" comment="rubygem-rack-1_3-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078743" comment="rubygem-rack-1_3-doc-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078744" comment="rubygem-rack-1_3-testsuite-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078745" comment="rubygem-rack-1_4-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078746" comment="rubygem-rack-1_4-doc-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078747" comment="rubygem-rack-1_4-testsuite-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078748" comment="rubygem-rails-2_3-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078749" comment="rubygem-rails-2_3-doc-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078750" comment="rubygem-rails-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078751" comment="rubygem-rails-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078752" comment="rubygem-rails-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078753" comment="rubygem-railties-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078754" comment="rubygem-railties-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078755" comment="rubygem-sprockets-2_2-2.2.2-2.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078756" comment="rubygem-sprockets-2_2-doc-2.2.2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
    <description>
    FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078536" comment="freetype2-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078538" comment="freetype2-devel-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078539" comment="freetype2-devel-32bit-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078540" comment="libfreetype6-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078541" comment="libfreetype6-32bit-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078544" comment="ft2demos-2.4.9-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5669</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078536" comment="freetype2-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078538" comment="freetype2-devel-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078539" comment="freetype2-devel-32bit-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078540" comment="libfreetype6-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078541" comment="libfreetype6-32bit-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078544" comment="ft2demos-2.4.9-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5670</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078536" comment="freetype2-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078538" comment="freetype2-devel-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078539" comment="freetype2-devel-32bit-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078540" comment="libfreetype6-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078541" comment="libfreetype6-32bit-2.4.9-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078544" comment="ft2demos-2.4.9-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5671</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5671" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077896" comment="exim-4.80.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077899" comment="eximon-4.80.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077901" comment="eximstats-html-4.80.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5688</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688" source="CVE"/>
    <description>
    ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078325" comment="bind-9.9.2P1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078326" comment="bind-chrootenv-9.9.2P1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078329" comment="bind-devel-9.9.2P1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078330" comment="bind-doc-9.9.2P1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078331" comment="bind-libs-32bit-9.9.2P1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078332" comment="bind-libs-9.9.2P1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078335" comment="bind-lwresd-9.9.2P1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078337" comment="bind-utils-9.9.2P1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5783</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783" source="CVE"/>
    <description>
    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078860" comment="jakarta-commons-httpclient-3.1-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078861" comment="jakarta-commons-httpclient-demo-3.1-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078862" comment="jakarta-commons-httpclient-javadoc-3.1-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078863" comment="jakarta-commons-httpclient-manual-3.1-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079415" comment="jakarta-commons-httpclient-3.1-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079416" comment="jakarta-commons-httpclient-demo-3.1-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079417" comment="jakarta-commons-httpclient-javadoc-3.1-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079418" comment="jakarta-commons-httpclient-manual-3.1-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
    <description>
    Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5836</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5837</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5837" source="CVE"/>
    <description>
    The Web Developer Toolbar in Mozilla Firefox before 17.0 executes script with chrome privileges, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
    <description>
    The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078180" comment="MozillaFirefox-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078181" comment="MozillaFirefox-branding-upstream-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078182" comment="MozillaFirefox-buildsymbols-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078185" comment="MozillaFirefox-devel-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078186" comment="MozillaFirefox-translations-common-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078187" comment="MozillaFirefox-translations-other-17.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078188" comment="MozillaThunderbird-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078189" comment="MozillaThunderbird-buildsymbols-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078192" comment="MozillaThunderbird-devel-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078194" comment="MozillaThunderbird-translations-common-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078195" comment="MozillaThunderbird-translations-other-17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078196" comment="enigmail-1.4.6+17.0-49.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078198" comment="mozilla-js-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078199" comment="mozilla-js-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078202" comment="xulrunner-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078203" comment="xulrunner-32bit-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078204" comment="xulrunner-buildsymbols-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078208" comment="xulrunner-devel-17.0-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078210" comment="seamonkey-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078213" comment="seamonkey-dom-inspector-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078214" comment="seamonkey-irc-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078215" comment="seamonkey-translations-common-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078216" comment="seamonkey-translations-other-2.14-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078217" comment="seamonkey-venkman-2.14-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5854</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5854" source="CVE"/>
    <description>
    Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078161" comment="weechat-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078162" comment="weechat-aspell-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078166" comment="weechat-devel-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078167" comment="weechat-guile-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078169" comment="weechat-lang-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078170" comment="weechat-lua-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078172" comment="weechat-perl-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078174" comment="weechat-python-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078176" comment="weechat-ruby-0.3.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078178" comment="weechat-tcl-0.3.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5885</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885" source="CVE"/>
    <description>
    The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5886</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886" source="CVE"/>
    <description>
    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5887</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887" source="CVE"/>
    <description>
    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078350" comment="tomcat-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078351" comment="tomcat-admin-webapps-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078352" comment="tomcat-docs-webapp-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078353" comment="tomcat-el-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078354" comment="tomcat-javadoc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078355" comment="tomcat-jsp-2_2-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078356" comment="tomcat-jsvc-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078357" comment="tomcat-lib-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078358" comment="tomcat-servlet-3_0-api-7.0.27-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078359" comment="tomcat-webapps-7.0.27-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5958</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5958" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078694" comment="libupnp-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078696" comment="libupnp-devel-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078697" comment="libupnp6-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078698" comment="libupnp6-32bit-1.6.18-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5959</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5959" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that contains a :: (colon colon) in a UDP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078694" comment="libupnp-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078696" comment="libupnp-devel-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078697" comment="libupnp6-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078698" comment="libupnp6-32bit-1.6.18-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5960</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5960" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078694" comment="libupnp-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078696" comment="libupnp-devel-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078697" comment="libupnp6-1.6.18-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078698" comment="libupnp6-32bit-1.6.18-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6076</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6076" source="CVE"/>
    <description>
    Inkscape before 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078805" comment="inkscape-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078808" comment="inkscape-extensions-dia-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078809" comment="inkscape-extensions-extra-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078810" comment="inkscape-extensions-fig-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078811" comment="inkscape-extensions-gimp-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078812" comment="inkscape-extensions-skencil-0.48.3.1-5.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078813" comment="inkscape-lang-0.48.3.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6085</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085" source="CVE"/>
    <description>
    The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079904" comment="gpg2-2.0.19-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079907" comment="gpg2-lang-2.0.19-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6093</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6093" source="CVE"/>
    <description>
    The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078647" comment="libqt4-devel-doc-4.8.1-2.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078648" comment="libqt4-devel-doc-data-4.8.1-2.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078651" comment="qt4-x11-tools-4.8.1-2.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078653" comment="libqt4-sql-mysql-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078654" comment="libqt4-sql-mysql-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078657" comment="libqt4-sql-plugins-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078659" comment="libqt4-sql-postgresql-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078660" comment="libqt4-sql-postgresql-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078663" comment="libqt4-sql-unixODBC-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078664" comment="libqt4-sql-unixODBC-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078667" comment="libqt4-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078668" comment="libqt4-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078672" comment="libqt4-devel-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078674" comment="libqt4-private-headers-devel-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078675" comment="libqt4-qt3support-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078676" comment="libqt4-qt3support-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078679" comment="libqt4-sql-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078680" comment="libqt4-sql-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078683" comment="libqt4-sql-sqlite-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078684" comment="libqt4-sql-sqlite-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078687" comment="libqt4-x11-32bit-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078688" comment="libqt4-x11-4.8.1-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078691" comment="qt4-qtscript-0.2.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078693" comment="qt4-qtscript-doc-0.2.0-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6096</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6096" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078547" comment="nagios-3.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078550" comment="nagios-devel-3.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078551" comment="nagios-www-3.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078553" comment="icinga-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078556" comment="icinga-devel-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078557" comment="icinga-doc-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078558" comment="icinga-idoutils-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078560" comment="icinga-idoutils-mysql-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078561" comment="icinga-idoutils-oracle-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078562" comment="icinga-idoutils-pgsql-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078563" comment="icinga-plugins-downtimes-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078564" comment="icinga-plugins-eventhandlers-1.7.4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078565" comment="icinga-www-1.7.4-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6097</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6097" source="CVE"/>
    <description>
    File descriptor leak in cronie 1.4.8, when running in certain environments, might allow local users to read restricted files, as demonstrated by reading /etc/crontab.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078579" comment="cron-4.2-37.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078580" comment="cronie-1.4.8-37.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078581" comment="cronie-anacron-1.4.8-37.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6109</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109" source="CVE"/>
    <description>
    lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078864" comment="rubygem-actionmailer-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078865" comment="rubygem-actionmailer-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078866" comment="rubygem-actionmailer-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078867" comment="rubygem-actionmailer-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078868" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078869" comment="rubygem-actionmailer-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078870" comment="rubygem-actionpack-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078871" comment="rubygem-actionpack-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078872" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078873" comment="rubygem-actionpack-3_2-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078874" comment="rubygem-actionpack-3_2-doc-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078875" comment="rubygem-actionpack-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078876" comment="rubygem-activemodel-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078877" comment="rubygem-activemodel-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078878" comment="rubygem-activerecord-2_3-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078879" comment="rubygem-activerecord-2_3-doc-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078880" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078881" comment="rubygem-activerecord-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078882" comment="rubygem-activerecord-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078883" comment="rubygem-activerecord-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078884" comment="rubygem-activeresource-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078885" comment="rubygem-activeresource-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078886" comment="rubygem-activeresource-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078887" comment="rubygem-activeresource-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078888" comment="rubygem-activeresource-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078889" comment="rubygem-activeresource-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078890" comment="rubygem-activesupport-2_3-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078891" comment="rubygem-activesupport-2_3-doc-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078892" comment="rubygem-activesupport-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078893" comment="rubygem-activesupport-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078894" comment="rubygem-activesupport-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078895" comment="rubygem-rack-1_1-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078896" comment="rubygem-rack-1_1-doc-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078897" comment="rubygem-rack-1_1-testsuite-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078898" comment="rubygem-rack-1_2-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078899" comment="rubygem-rack-1_2-doc-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078900" comment="rubygem-rack-1_2-testsuite-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078901" comment="rubygem-rack-1_3-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078902" comment="rubygem-rack-1_3-doc-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078903" comment="rubygem-rack-1_3-testsuite-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078904" comment="rubygem-rack-1_4-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078905" comment="rubygem-rack-1_4-doc-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078906" comment="rubygem-rack-1_4-testsuite-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078907" comment="rubygem-rails-2_3-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078908" comment="rubygem-rails-2_3-doc-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078909" comment="rubygem-rails-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078910" comment="rubygem-rails-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078911" comment="rubygem-rails-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078912" comment="rubygem-railties-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078913" comment="rubygem-railties-3_2-doc-3.2.12-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6121</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6121" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 0.8.5 allows remote attackers to inject arbitrary web script or HTML via a (1) data:text or (2) vbscript link.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078831" comment="roundcubemail-0.8.5-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090384" comment="roundcubemail-0.9.3-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6129</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6129" source="CVE"/>
    <description>
    Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted "micro transport protocol packets."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079276" comment="transmission-2.60-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079277" comment="transmission-common-2.60-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079280" comment="transmission-gtk-2.60-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079282" comment="transmission-gtk-lang-2.60-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079283" comment="transmission-qt-2.60-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6139</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139" source="CVE"/>
    <description>
    libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079375" comment="libxslt-python-1.1.26-22.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079378" comment="libxslt-1.1.26-22.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079380" comment="libxslt-devel-1.1.26-22.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079381" comment="libxslt-devel-32bit-1.1.26-22.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079382" comment="libxslt-tools-1.1.26-22.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079384" comment="libxslt1-1.1.26-22.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079385" comment="libxslt1-32bit-1.1.26-22.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6329</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329" source="CVE"/>
    <description>
    The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079256" comment="perl-32bit-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079257" comment="perl-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079258" comment="perl-base-32bit-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079259" comment="perl-base-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079265" comment="perl-doc-5.16.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2012CVE-2012-3523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-CVE-2012-3523</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-CVE-2012-3523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-CVE-2012-3523" source="CVE"/>
    <description>
    Unknown.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081106" comment="inn-2.5.2-12.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081109" comment="inn-devel-2.5.2-12.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081110" comment="mininews-2.5.2-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0153</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153" source="CVE"/>
    <description>
    The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0154</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0154" source="CVE"/>
    <description>
    The get_page_type function in xen/arch/x86/mm.c in Xen 4.2, when debugging is enabled, allows local PV or HVM guest administrators to cause a denial of service (assertion failure and hypervisor crash) via unspecified vectors related to a hypercall.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079435" comment="xen-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079437" comment="xen-devel-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079438" comment="xen-kmp-default-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079440" comment="xen-kmp-desktop-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079442" comment="xen-kmp-pae-4.1.4_02_k3.4.33_2.24-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079444" comment="xen-libs-32bit-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079445" comment="xen-libs-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079448" comment="xen-tools-domU-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079450" comment="xen-doc-html-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079451" comment="xen-doc-pdf-4.1.4_02-5.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079452" comment="xen-tools-4.1.4_02-5.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0155</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155" source="CVE"/>
    <description>
    Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078705" comment="rubygem-actionmailer-2_3-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078706" comment="rubygem-actionmailer-2_3-doc-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078707" comment="rubygem-actionmailer-2_3-testsuite-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078708" comment="rubygem-actionmailer-3_2-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078709" comment="rubygem-actionmailer-3_2-doc-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078710" comment="rubygem-actionmailer-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078711" comment="rubygem-actionpack-2_3-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078712" comment="rubygem-actionpack-2_3-doc-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078713" comment="rubygem-actionpack-2_3-testsuite-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078714" comment="rubygem-actionpack-3_2-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078715" comment="rubygem-actionpack-3_2-doc-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078716" comment="rubygem-actionpack-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078717" comment="rubygem-activemodel-3_2-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078718" comment="rubygem-activemodel-3_2-doc-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078719" comment="rubygem-activerecord-2_3-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078720" comment="rubygem-activerecord-2_3-doc-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078721" comment="rubygem-activerecord-2_3-testsuite-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078722" comment="rubygem-activerecord-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078723" comment="rubygem-activerecord-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078724" comment="rubygem-activerecord-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078725" comment="rubygem-activeresource-2_3-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078726" comment="rubygem-activeresource-2_3-doc-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078727" comment="rubygem-activeresource-2_3-testsuite-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078728" comment="rubygem-activeresource-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078729" comment="rubygem-activeresource-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078730" comment="rubygem-activeresource-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078731" comment="rubygem-activesupport-2_3-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078732" comment="rubygem-activesupport-2_3-doc-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078733" comment="rubygem-activesupport-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078734" comment="rubygem-activesupport-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078735" comment="rubygem-activesupport-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078736" comment="rubygem-rack-1_1-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078737" comment="rubygem-rack-1_1-doc-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078738" comment="rubygem-rack-1_1-testsuite-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078739" comment="rubygem-rack-1_2-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078740" comment="rubygem-rack-1_2-doc-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078741" comment="rubygem-rack-1_2-testsuite-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078742" comment="rubygem-rack-1_3-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078743" comment="rubygem-rack-1_3-doc-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078744" comment="rubygem-rack-1_3-testsuite-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078745" comment="rubygem-rack-1_4-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078746" comment="rubygem-rack-1_4-doc-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078747" comment="rubygem-rack-1_4-testsuite-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078748" comment="rubygem-rails-2_3-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078749" comment="rubygem-rails-2_3-doc-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078750" comment="rubygem-rails-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078751" comment="rubygem-rails-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078752" comment="rubygem-rails-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078753" comment="rubygem-railties-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078754" comment="rubygem-railties-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078755" comment="rubygem-sprockets-2_2-2.2.2-2.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078756" comment="rubygem-sprockets-2_2-doc-2.2.2-2.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092005" comment="rubygem-actionpack-3_2-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092006" comment="rubygem-actionpack-3_2-doc-3.2.12-3.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0156</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156" source="CVE"/>
    <description>
    active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078705" comment="rubygem-actionmailer-2_3-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078706" comment="rubygem-actionmailer-2_3-doc-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078707" comment="rubygem-actionmailer-2_3-testsuite-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078708" comment="rubygem-actionmailer-3_2-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078709" comment="rubygem-actionmailer-3_2-doc-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078710" comment="rubygem-actionmailer-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078711" comment="rubygem-actionpack-2_3-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078712" comment="rubygem-actionpack-2_3-doc-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078713" comment="rubygem-actionpack-2_3-testsuite-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078714" comment="rubygem-actionpack-3_2-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078715" comment="rubygem-actionpack-3_2-doc-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078716" comment="rubygem-actionpack-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078717" comment="rubygem-activemodel-3_2-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078718" comment="rubygem-activemodel-3_2-doc-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078719" comment="rubygem-activerecord-2_3-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078720" comment="rubygem-activerecord-2_3-doc-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078721" comment="rubygem-activerecord-2_3-testsuite-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078722" comment="rubygem-activerecord-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078723" comment="rubygem-activerecord-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078724" comment="rubygem-activerecord-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078725" comment="rubygem-activeresource-2_3-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078726" comment="rubygem-activeresource-2_3-doc-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078727" comment="rubygem-activeresource-2_3-testsuite-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078728" comment="rubygem-activeresource-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078729" comment="rubygem-activeresource-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078730" comment="rubygem-activeresource-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078731" comment="rubygem-activesupport-2_3-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078732" comment="rubygem-activesupport-2_3-doc-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078733" comment="rubygem-activesupport-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078734" comment="rubygem-activesupport-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078735" comment="rubygem-activesupport-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078736" comment="rubygem-rack-1_1-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078737" comment="rubygem-rack-1_1-doc-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078738" comment="rubygem-rack-1_1-testsuite-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078739" comment="rubygem-rack-1_2-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078740" comment="rubygem-rack-1_2-doc-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078741" comment="rubygem-rack-1_2-testsuite-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078742" comment="rubygem-rack-1_3-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078743" comment="rubygem-rack-1_3-doc-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078744" comment="rubygem-rack-1_3-testsuite-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078745" comment="rubygem-rack-1_4-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078746" comment="rubygem-rack-1_4-doc-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078747" comment="rubygem-rack-1_4-testsuite-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078748" comment="rubygem-rails-2_3-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078749" comment="rubygem-rails-2_3-doc-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078750" comment="rubygem-rails-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078751" comment="rubygem-rails-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078752" comment="rubygem-rails-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078753" comment="rubygem-railties-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078754" comment="rubygem-railties-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078755" comment="rubygem-sprockets-2_2-2.2.2-2.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078756" comment="rubygem-sprockets-2_2-doc-2.2.2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
    <description>
    The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079093" comment="kernel-debug-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079094" comment="kernel-debug-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079098" comment="kernel-debug-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079100" comment="kernel-default-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079101" comment="kernel-default-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079105" comment="kernel-default-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079107" comment="kernel-desktop-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079108" comment="kernel-desktop-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079112" comment="kernel-desktop-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079114" comment="kernel-docs-3.4.33-2.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079115" comment="kernel-ec2-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079116" comment="kernel-ec2-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079120" comment="kernel-ec2-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079122" comment="kernel-ec2-extra-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079124" comment="kernel-pae-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079125" comment="kernel-pae-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079129" comment="kernel-pae-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079131" comment="kernel-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079132" comment="kernel-source-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079133" comment="kernel-source-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079134" comment="kernel-syms-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079135" comment="kernel-trace-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079136" comment="kernel-trace-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079140" comment="kernel-trace-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079142" comment="kernel-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079145" comment="kernel-vanilla-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079147" comment="kernel-xen-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079148" comment="kernel-xen-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079152" comment="kernel-xen-devel-3.4.33-2.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
    <description>
    OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078917" comment="libopenssl-devel-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078918" comment="libopenssl-devel-32bit-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078919" comment="libopenssl1_0_0-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078920" comment="libopenssl1_0_0-32bit-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078923" comment="openssl-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078926" comment="openssl-doc-1.0.1e-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
    <description>
    The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078917" comment="libopenssl-devel-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078918" comment="libopenssl-devel-32bit-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078919" comment="libopenssl1_0_0-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078920" comment="libopenssl1_0_0-32bit-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078923" comment="openssl-1.0.1e-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078926" comment="openssl-doc-1.0.1e-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0170</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170" source="CVE"/>
    <description>
    Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078791" comment="libvirt-0.9.11.9-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078792" comment="libvirt-client-0.9.11.9-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078793" comment="libvirt-client-32bit-0.9.11.9-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078798" comment="libvirt-devel-0.9.11.9-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078799" comment="libvirt-devel-32bit-0.9.11.9-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078800" comment="libvirt-doc-0.9.11.9-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078801" comment="libvirt-lock-sanlock-0.9.11.9-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078803" comment="libvirt-python-0.9.11.9-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0183</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0183" source="CVE"/>
    <description>
    multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078864" comment="rubygem-actionmailer-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078865" comment="rubygem-actionmailer-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078866" comment="rubygem-actionmailer-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078867" comment="rubygem-actionmailer-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078868" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078869" comment="rubygem-actionmailer-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078870" comment="rubygem-actionpack-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078871" comment="rubygem-actionpack-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078872" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078873" comment="rubygem-actionpack-3_2-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078874" comment="rubygem-actionpack-3_2-doc-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078875" comment="rubygem-actionpack-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078876" comment="rubygem-activemodel-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078877" comment="rubygem-activemodel-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078878" comment="rubygem-activerecord-2_3-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078879" comment="rubygem-activerecord-2_3-doc-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078880" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078881" comment="rubygem-activerecord-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078882" comment="rubygem-activerecord-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078883" comment="rubygem-activerecord-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078884" comment="rubygem-activeresource-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078885" comment="rubygem-activeresource-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078886" comment="rubygem-activeresource-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078887" comment="rubygem-activeresource-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078888" comment="rubygem-activeresource-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078889" comment="rubygem-activeresource-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078890" comment="rubygem-activesupport-2_3-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078891" comment="rubygem-activesupport-2_3-doc-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078892" comment="rubygem-activesupport-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078893" comment="rubygem-activesupport-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078894" comment="rubygem-activesupport-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078895" comment="rubygem-rack-1_1-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078896" comment="rubygem-rack-1_1-doc-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078897" comment="rubygem-rack-1_1-testsuite-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078898" comment="rubygem-rack-1_2-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078899" comment="rubygem-rack-1_2-doc-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078900" comment="rubygem-rack-1_2-testsuite-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078901" comment="rubygem-rack-1_3-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078902" comment="rubygem-rack-1_3-doc-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078903" comment="rubygem-rack-1_3-testsuite-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078904" comment="rubygem-rack-1_4-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078905" comment="rubygem-rack-1_4-doc-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078906" comment="rubygem-rack-1_4-testsuite-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078907" comment="rubygem-rails-2_3-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078908" comment="rubygem-rails-2_3-doc-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078909" comment="rubygem-rails-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078910" comment="rubygem-rails-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078911" comment="rubygem-rails-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078912" comment="rubygem-railties-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078913" comment="rubygem-railties-3_2-doc-3.2.12-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0184</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0184" source="CVE"/>
    <description>
    Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078864" comment="rubygem-actionmailer-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078865" comment="rubygem-actionmailer-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078866" comment="rubygem-actionmailer-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078867" comment="rubygem-actionmailer-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078868" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078869" comment="rubygem-actionmailer-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078870" comment="rubygem-actionpack-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078871" comment="rubygem-actionpack-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078872" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078873" comment="rubygem-actionpack-3_2-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078874" comment="rubygem-actionpack-3_2-doc-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078875" comment="rubygem-actionpack-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078876" comment="rubygem-activemodel-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078877" comment="rubygem-activemodel-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078878" comment="rubygem-activerecord-2_3-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078879" comment="rubygem-activerecord-2_3-doc-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078880" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078881" comment="rubygem-activerecord-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078882" comment="rubygem-activerecord-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078883" comment="rubygem-activerecord-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078884" comment="rubygem-activeresource-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078885" comment="rubygem-activeresource-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078886" comment="rubygem-activeresource-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078887" comment="rubygem-activeresource-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078888" comment="rubygem-activeresource-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078889" comment="rubygem-activeresource-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078890" comment="rubygem-activesupport-2_3-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078891" comment="rubygem-activesupport-2_3-doc-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078892" comment="rubygem-activesupport-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078893" comment="rubygem-activesupport-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078894" comment="rubygem-activesupport-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078895" comment="rubygem-rack-1_1-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078896" comment="rubygem-rack-1_1-doc-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078897" comment="rubygem-rack-1_1-testsuite-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078898" comment="rubygem-rack-1_2-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078899" comment="rubygem-rack-1_2-doc-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078900" comment="rubygem-rack-1_2-testsuite-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078901" comment="rubygem-rack-1_3-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078902" comment="rubygem-rack-1_3-doc-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078903" comment="rubygem-rack-1_3-testsuite-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078904" comment="rubygem-rack-1_4-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078905" comment="rubygem-rack-1_4-doc-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078906" comment="rubygem-rack-1_4-testsuite-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078907" comment="rubygem-rails-2_3-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078908" comment="rubygem-rails-2_3-doc-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078909" comment="rubygem-rails-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078910" comment="rubygem-rails-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078911" comment="rubygem-rails-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078912" comment="rubygem-railties-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078913" comment="rubygem-railties-3_2-doc-3.2.12-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0188</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0188" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-0189, CVE-2013-0191.  Reason: this identifier was intended for one issue, but it was inadvertently associated with multiple issues.  Notes: All CVE users should consult CVE-2013-0189 and CVE-2013-0191 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090449" comment="squid-2.7.STABLE9-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0189</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0189" source="CVE"/>
    <description>
    cachemgr.cgi in Squid 3.1.x and 3.2.x, possibly 3.1.22, 3.2.4, and other versions, allows remote attackers to cause a denial of service (resource consumption) via a crafted request.  NOTE: this issue is due to an incorrect fix for CVE-2012-5643, possibly involving an incorrect order of arguments or incorrect comparison.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090449" comment="squid-2.7.STABLE9-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
    <description>
    The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078757" comment="samba-doc-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078758" comment="ldapsmb-1.34b-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078759" comment="libnetapi-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078760" comment="libnetapi0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078762" comment="libsmbclient-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078763" comment="libsmbclient0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078764" comment="libsmbclient0-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078767" comment="libsmbsharemodes-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078768" comment="libsmbsharemodes0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078770" comment="libwbclient-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078771" comment="libwbclient0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078772" comment="libwbclient0-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078775" comment="samba-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078776" comment="samba-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078777" comment="samba-client-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078778" comment="samba-client-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078784" comment="samba-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078785" comment="samba-krb-printing-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078787" comment="samba-winbind-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078788" comment="samba-winbind-32bit-3.6.7-48.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078757" comment="samba-doc-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078758" comment="ldapsmb-1.34b-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078759" comment="libnetapi-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078760" comment="libnetapi0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078762" comment="libsmbclient-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078763" comment="libsmbclient0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078764" comment="libsmbclient0-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078767" comment="libsmbsharemodes-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078768" comment="libsmbsharemodes0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078770" comment="libwbclient-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078771" comment="libwbclient0-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078772" comment="libwbclient0-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078775" comment="samba-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078776" comment="samba-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078777" comment="samba-client-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078778" comment="samba-client-32bit-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078784" comment="samba-devel-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078785" comment="samba-krb-printing-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078787" comment="samba-winbind-3.6.7-48.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078788" comment="samba-winbind-32bit-3.6.7-48.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0216</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216" source="CVE"/>
    <description>
    The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079093" comment="kernel-debug-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079094" comment="kernel-debug-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079098" comment="kernel-debug-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079100" comment="kernel-default-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079101" comment="kernel-default-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079105" comment="kernel-default-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079107" comment="kernel-desktop-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079108" comment="kernel-desktop-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079112" comment="kernel-desktop-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079114" comment="kernel-docs-3.4.33-2.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079115" comment="kernel-ec2-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079116" comment="kernel-ec2-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079120" comment="kernel-ec2-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079122" comment="kernel-ec2-extra-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079124" comment="kernel-pae-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079125" comment="kernel-pae-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079129" comment="kernel-pae-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079131" comment="kernel-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079132" comment="kernel-source-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079133" comment="kernel-source-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079134" comment="kernel-syms-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079135" comment="kernel-trace-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079136" comment="kernel-trace-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079140" comment="kernel-trace-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079142" comment="kernel-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079145" comment="kernel-vanilla-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079147" comment="kernel-xen-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079148" comment="kernel-xen-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079152" comment="kernel-xen-devel-3.4.33-2.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078622" comment="coreutils-8.16-5.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078625" comment="coreutils-lang-8.16-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078622" comment="coreutils-8.16-5.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078625" comment="coreutils-lang-8.16-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078622" comment="coreutils-8.16-5.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078625" comment="coreutils-lang-8.16-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
    <description>
    The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079093" comment="kernel-debug-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079094" comment="kernel-debug-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079098" comment="kernel-debug-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079100" comment="kernel-default-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079101" comment="kernel-default-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079105" comment="kernel-default-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079107" comment="kernel-desktop-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079108" comment="kernel-desktop-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079112" comment="kernel-desktop-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079114" comment="kernel-docs-3.4.33-2.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079115" comment="kernel-ec2-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079116" comment="kernel-ec2-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079120" comment="kernel-ec2-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079122" comment="kernel-ec2-extra-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079124" comment="kernel-pae-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079125" comment="kernel-pae-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079129" comment="kernel-pae-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079131" comment="kernel-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079132" comment="kernel-source-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079133" comment="kernel-source-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079134" comment="kernel-syms-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079135" comment="kernel-trace-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079136" comment="kernel-trace-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079140" comment="kernel-trace-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079142" comment="kernel-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079145" comment="kernel-vanilla-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079147" comment="kernel-xen-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079148" comment="kernel-xen-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079152" comment="kernel-xen-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0233</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0233" source="CVE"/>
    <description>
    Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078977" comment="rubygem-devise-1.5.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078978" comment="rubygem-devise-doc-1.5.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078979" comment="rubygem-devise-testsuite-1.5.4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0240</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0240" source="CVE"/>
    <description>
    Gnome Online Accounts (GOA) 3.4.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.5, does not properly validate SSL certificates when creating accounts such as Windows Live and Facebook accounts, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078814" comment="gnome-online-accounts-3.4.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078817" comment="gnome-online-accounts-devel-3.4.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078818" comment="gnome-online-accounts-lang-3.4.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078819" comment="libgoa-1_0-0-3.4.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078820" comment="libgoa-1_0-0-32bit-3.4.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078823" comment="libgoa-backend-1_0-0-3.4.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078824" comment="libgoa-backend-1_0-0-32bit-3.4.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078827" comment="typelib-1_0-Goa-1_0-3.4.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0252</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0252" source="CVE"/>
    <description>
    boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090838" comment="boost-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090839" comment="boost-devel-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090840" comment="boost-devel-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090841" comment="boost-doc-html-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090842" comment="boost-doc-man-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090843" comment="boost-doc-pdf-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090844" comment="boost-license1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090845" comment="libboost_chrono1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090846" comment="libboost_date_time1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090847" comment="libboost_date_time1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090848" comment="libboost_filesystem1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090849" comment="libboost_filesystem1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090850" comment="libboost_graph1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090851" comment="libboost_graph1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090852" comment="libboost_iostreams1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090853" comment="libboost_iostreams1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090854" comment="libboost_locale1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090855" comment="libboost_math1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090856" comment="libboost_math1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090857" comment="libboost_mpi1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090858" comment="libboost_mpi1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090859" comment="libboost_program_options1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090860" comment="libboost_program_options1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090861" comment="libboost_python1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090862" comment="libboost_python1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090863" comment="libboost_random1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090864" comment="libboost_random1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090865" comment="libboost_regex1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090866" comment="libboost_regex1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090867" comment="libboost_serialization1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090868" comment="libboost_serialization1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090869" comment="libboost_signals1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090870" comment="libboost_signals1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090871" comment="libboost_system1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090872" comment="libboost_system1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090873" comment="libboost_test1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090874" comment="libboost_test1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090875" comment="libboost_thread1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090876" comment="libboost_thread1_49_0-32bit-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090877" comment="libboost_timer1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090878" comment="libboost_wave1_49_0-1.49.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090879" comment="libboost_wave1_49_0-32bit-1.49.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0254</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254" source="CVE"/>
    <description>
    The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079031" comment="libqt4-devel-doc-4.8.1-2.16.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079032" comment="libqt4-devel-doc-data-4.8.1-2.16.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079035" comment="qt4-x11-tools-4.8.1-2.16.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079037" comment="libqt4-sql-mysql-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079038" comment="libqt4-sql-mysql-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079041" comment="libqt4-sql-plugins-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079043" comment="libqt4-sql-postgresql-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079044" comment="libqt4-sql-postgresql-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079047" comment="libqt4-sql-unixODBC-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079048" comment="libqt4-sql-unixODBC-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079051" comment="libqt4-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079052" comment="libqt4-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079056" comment="libqt4-devel-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079058" comment="libqt4-private-headers-devel-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079059" comment="libqt4-qt3support-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079060" comment="libqt4-qt3support-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079063" comment="libqt4-sql-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079064" comment="libqt4-sql-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079067" comment="libqt4-sql-sqlite-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079068" comment="libqt4-sql-sqlite-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079071" comment="libqt4-x11-32bit-4.8.1-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079072" comment="libqt4-x11-4.8.1-2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0255</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078832" comment="libecpg6-32bit-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078833" comment="libecpg6-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078836" comment="libpq5-32bit-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078837" comment="libpq5-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078840" comment="postgresql91-devel-32bit-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078841" comment="postgresql91-devel-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078844" comment="postgresql91-libs-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078846" comment="postgresql91-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078847" comment="postgresql91-contrib-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078851" comment="postgresql91-docs-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078852" comment="postgresql91-plperl-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078854" comment="postgresql91-plpython-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078856" comment="postgresql91-pltcl-9.1.8-16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078858" comment="postgresql91-server-9.1.8-16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0256</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0256" source="CVE"/>
    <description>
    darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078914" comment="rubygem-rdoc-3.12.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078915" comment="rubygem-rdoc-doc-3.12.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078916" comment="rubygem-rdoc-testsuite-3.12.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078980" comment="ruby19-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078983" comment="ruby19-devel-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078984" comment="ruby19-devel-extra-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078985" comment="ruby19-doc-ri-1.9.3.p385-3.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078986" comment="ruby19-tk-1.9.3.p385-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0262</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0262" source="CVE"/>
    <description>
    rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078864" comment="rubygem-actionmailer-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078865" comment="rubygem-actionmailer-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078866" comment="rubygem-actionmailer-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078867" comment="rubygem-actionmailer-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078868" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078869" comment="rubygem-actionmailer-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078870" comment="rubygem-actionpack-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078871" comment="rubygem-actionpack-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078872" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078873" comment="rubygem-actionpack-3_2-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078874" comment="rubygem-actionpack-3_2-doc-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078875" comment="rubygem-actionpack-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078876" comment="rubygem-activemodel-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078877" comment="rubygem-activemodel-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078878" comment="rubygem-activerecord-2_3-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078879" comment="rubygem-activerecord-2_3-doc-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078880" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078881" comment="rubygem-activerecord-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078882" comment="rubygem-activerecord-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078883" comment="rubygem-activerecord-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078884" comment="rubygem-activeresource-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078885" comment="rubygem-activeresource-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078886" comment="rubygem-activeresource-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078887" comment="rubygem-activeresource-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078888" comment="rubygem-activeresource-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078889" comment="rubygem-activeresource-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078890" comment="rubygem-activesupport-2_3-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078891" comment="rubygem-activesupport-2_3-doc-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078892" comment="rubygem-activesupport-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078893" comment="rubygem-activesupport-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078894" comment="rubygem-activesupport-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078895" comment="rubygem-rack-1_1-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078896" comment="rubygem-rack-1_1-doc-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078897" comment="rubygem-rack-1_1-testsuite-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078898" comment="rubygem-rack-1_2-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078899" comment="rubygem-rack-1_2-doc-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078900" comment="rubygem-rack-1_2-testsuite-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078901" comment="rubygem-rack-1_3-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078902" comment="rubygem-rack-1_3-doc-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078903" comment="rubygem-rack-1_3-testsuite-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078904" comment="rubygem-rack-1_4-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078905" comment="rubygem-rack-1_4-doc-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078906" comment="rubygem-rack-1_4-testsuite-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078907" comment="rubygem-rails-2_3-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078908" comment="rubygem-rails-2_3-doc-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078909" comment="rubygem-rails-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078910" comment="rubygem-rails-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078911" comment="rubygem-rails-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078912" comment="rubygem-railties-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078913" comment="rubygem-railties-3_2-doc-3.2.12-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0263</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0263" source="CVE"/>
    <description>
    Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078864" comment="rubygem-actionmailer-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078865" comment="rubygem-actionmailer-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078866" comment="rubygem-actionmailer-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078867" comment="rubygem-actionmailer-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078868" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078869" comment="rubygem-actionmailer-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078870" comment="rubygem-actionpack-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078871" comment="rubygem-actionpack-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078872" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078873" comment="rubygem-actionpack-3_2-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078874" comment="rubygem-actionpack-3_2-doc-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078875" comment="rubygem-actionpack-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078876" comment="rubygem-activemodel-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078877" comment="rubygem-activemodel-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078878" comment="rubygem-activerecord-2_3-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078879" comment="rubygem-activerecord-2_3-doc-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078880" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078881" comment="rubygem-activerecord-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078882" comment="rubygem-activerecord-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078883" comment="rubygem-activerecord-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078884" comment="rubygem-activeresource-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078885" comment="rubygem-activeresource-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078886" comment="rubygem-activeresource-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078887" comment="rubygem-activeresource-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078888" comment="rubygem-activeresource-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078889" comment="rubygem-activeresource-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078890" comment="rubygem-activesupport-2_3-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078891" comment="rubygem-activesupport-2_3-doc-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078892" comment="rubygem-activesupport-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078893" comment="rubygem-activesupport-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078894" comment="rubygem-activesupport-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078895" comment="rubygem-rack-1_1-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078896" comment="rubygem-rack-1_1-doc-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078897" comment="rubygem-rack-1_1-testsuite-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078898" comment="rubygem-rack-1_2-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078899" comment="rubygem-rack-1_2-doc-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078900" comment="rubygem-rack-1_2-testsuite-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078901" comment="rubygem-rack-1_3-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078902" comment="rubygem-rack-1_3-doc-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078903" comment="rubygem-rack-1_3-testsuite-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078904" comment="rubygem-rack-1_4-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078905" comment="rubygem-rack-1_4-doc-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078906" comment="rubygem-rack-1_4-testsuite-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078907" comment="rubygem-rails-2_3-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078908" comment="rubygem-rails-2_3-doc-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078909" comment="rubygem-rails-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078910" comment="rubygem-rails-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078911" comment="rubygem-rails-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078912" comment="rubygem-railties-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078913" comment="rubygem-railties-3_2-doc-3.2.12-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0269</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269" source="CVE"/>
    <description>
    The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079363" comment="ruby-1.9.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079364" comment="ruby-common-1.9.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079365" comment="ruby-devel-1.9.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079366" comment="ruby19-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079369" comment="ruby19-devel-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079370" comment="ruby19-devel-extra-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079371" comment="ruby19-doc-ri-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079372" comment="ruby19-tk-1.9.3.p392-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0271</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" source="CVE"/>
    <description>
    The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079075" comment="finch-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079077" comment="finch-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079078" comment="libpurple-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079079" comment="libpurple-branding-upstream-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079081" comment="libpurple-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079082" comment="libpurple-lang-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079083" comment="libpurple-meanwhile-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079085" comment="libpurple-tcl-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079087" comment="pidgin-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079090" comment="pidgin-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079091" comment="pidgin-evolution-2.10.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0272</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" source="CVE"/>
    <description>
    Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079075" comment="finch-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079077" comment="finch-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079078" comment="libpurple-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079079" comment="libpurple-branding-upstream-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079081" comment="libpurple-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079082" comment="libpurple-lang-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079083" comment="libpurple-meanwhile-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079085" comment="libpurple-tcl-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079087" comment="pidgin-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079090" comment="pidgin-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079091" comment="pidgin-evolution-2.10.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0273</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" source="CVE"/>
    <description>
    sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079075" comment="finch-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079077" comment="finch-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079078" comment="libpurple-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079079" comment="libpurple-branding-upstream-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079081" comment="libpurple-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079082" comment="libpurple-lang-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079083" comment="libpurple-meanwhile-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079085" comment="libpurple-tcl-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079087" comment="pidgin-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079090" comment="pidgin-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079091" comment="pidgin-evolution-2.10.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0274</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" source="CVE"/>
    <description>
    upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079075" comment="finch-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079077" comment="finch-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079078" comment="libpurple-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079079" comment="libpurple-branding-upstream-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079081" comment="libpurple-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079082" comment="libpurple-lang-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079083" comment="libpurple-meanwhile-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079085" comment="libpurple-tcl-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079087" comment="pidgin-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079090" comment="pidgin-devel-2.10.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079091" comment="pidgin-evolution-2.10.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0276</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276" source="CVE"/>
    <description>
    ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection mechanism and modify protected model attributes via a crafted request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078864" comment="rubygem-actionmailer-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078865" comment="rubygem-actionmailer-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078866" comment="rubygem-actionmailer-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078867" comment="rubygem-actionmailer-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078868" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078869" comment="rubygem-actionmailer-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078870" comment="rubygem-actionpack-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078871" comment="rubygem-actionpack-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078872" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078873" comment="rubygem-actionpack-3_2-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078874" comment="rubygem-actionpack-3_2-doc-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078875" comment="rubygem-actionpack-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078876" comment="rubygem-activemodel-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078877" comment="rubygem-activemodel-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078878" comment="rubygem-activerecord-2_3-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078879" comment="rubygem-activerecord-2_3-doc-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078880" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078881" comment="rubygem-activerecord-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078882" comment="rubygem-activerecord-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078883" comment="rubygem-activerecord-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078884" comment="rubygem-activeresource-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078885" comment="rubygem-activeresource-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078886" comment="rubygem-activeresource-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078887" comment="rubygem-activeresource-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078888" comment="rubygem-activeresource-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078889" comment="rubygem-activeresource-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078890" comment="rubygem-activesupport-2_3-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078891" comment="rubygem-activesupport-2_3-doc-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078892" comment="rubygem-activesupport-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078893" comment="rubygem-activesupport-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078894" comment="rubygem-activesupport-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078895" comment="rubygem-rack-1_1-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078896" comment="rubygem-rack-1_1-doc-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078897" comment="rubygem-rack-1_1-testsuite-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078898" comment="rubygem-rack-1_2-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078899" comment="rubygem-rack-1_2-doc-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078900" comment="rubygem-rack-1_2-testsuite-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078901" comment="rubygem-rack-1_3-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078902" comment="rubygem-rack-1_3-doc-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078903" comment="rubygem-rack-1_3-testsuite-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078904" comment="rubygem-rack-1_4-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078905" comment="rubygem-rack-1_4-doc-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078906" comment="rubygem-rack-1_4-testsuite-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078907" comment="rubygem-rails-2_3-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078908" comment="rubygem-rails-2_3-doc-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078909" comment="rubygem-rails-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078910" comment="rubygem-rails-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078911" comment="rubygem-rails-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078912" comment="rubygem-railties-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078913" comment="rubygem-railties-3_2-doc-3.2.12-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0277</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0277" source="CVE"/>
    <description>
    ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078864" comment="rubygem-actionmailer-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078865" comment="rubygem-actionmailer-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078866" comment="rubygem-actionmailer-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078867" comment="rubygem-actionmailer-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078868" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078869" comment="rubygem-actionmailer-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078870" comment="rubygem-actionpack-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078871" comment="rubygem-actionpack-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078872" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078873" comment="rubygem-actionpack-3_2-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078874" comment="rubygem-actionpack-3_2-doc-3.2.12-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078875" comment="rubygem-actionpack-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078876" comment="rubygem-activemodel-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078877" comment="rubygem-activemodel-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078878" comment="rubygem-activerecord-2_3-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078879" comment="rubygem-activerecord-2_3-doc-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078880" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078881" comment="rubygem-activerecord-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078882" comment="rubygem-activerecord-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078883" comment="rubygem-activerecord-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078884" comment="rubygem-activeresource-2_3-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078885" comment="rubygem-activeresource-2_3-doc-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078886" comment="rubygem-activeresource-2_3-testsuite-2.3.17-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078887" comment="rubygem-activeresource-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078888" comment="rubygem-activeresource-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078889" comment="rubygem-activeresource-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078890" comment="rubygem-activesupport-2_3-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078891" comment="rubygem-activesupport-2_3-doc-2.3.17-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078892" comment="rubygem-activesupport-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078893" comment="rubygem-activesupport-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078894" comment="rubygem-activesupport-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078895" comment="rubygem-rack-1_1-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078896" comment="rubygem-rack-1_1-doc-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078897" comment="rubygem-rack-1_1-testsuite-1.1.6-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078898" comment="rubygem-rack-1_2-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078899" comment="rubygem-rack-1_2-doc-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078900" comment="rubygem-rack-1_2-testsuite-1.2.8-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078901" comment="rubygem-rack-1_3-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078902" comment="rubygem-rack-1_3-doc-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078903" comment="rubygem-rack-1_3-testsuite-1.3.10-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078904" comment="rubygem-rack-1_4-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078905" comment="rubygem-rack-1_4-doc-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078906" comment="rubygem-rack-1_4-testsuite-1.4.5-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078907" comment="rubygem-rails-2_3-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078908" comment="rubygem-rails-2_3-doc-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078909" comment="rubygem-rails-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078910" comment="rubygem-rails-3_2-doc-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078911" comment="rubygem-rails-2.3.17-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078912" comment="rubygem-railties-3_2-3.2.12-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078913" comment="rubygem-railties-3_2-doc-3.2.12-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0288</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0288" source="CVE"/>
    <description>
    nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079285" comment="nss-pam-ldapd-0.7.13-11.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079286" comment="nss-pam-ldapd-32bit-0.7.13-11.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0290</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0290" source="CVE"/>
    <description>
    The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079912" comment="kernel-debug-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079913" comment="kernel-debug-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079917" comment="kernel-debug-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079919" comment="kernel-default-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079920" comment="kernel-default-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079924" comment="kernel-default-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079926" comment="kernel-desktop-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079927" comment="kernel-desktop-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079931" comment="kernel-desktop-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079933" comment="kernel-docs-3.4.47-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079934" comment="kernel-ec2-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079935" comment="kernel-ec2-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079939" comment="kernel-ec2-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079941" comment="kernel-ec2-extra-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079943" comment="kernel-pae-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079944" comment="kernel-pae-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079948" comment="kernel-pae-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079950" comment="kernel-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079951" comment="kernel-source-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079952" comment="kernel-source-vanilla-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079953" comment="kernel-syms-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079954" comment="kernel-trace-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079955" comment="kernel-trace-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079959" comment="kernel-trace-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079961" comment="kernel-vanilla-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079964" comment="kernel-vanilla-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079966" comment="kernel-xen-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079967" comment="kernel-xen-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079971" comment="kernel-xen-devel-3.4.47-2.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0296</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0296" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079356" comment="pigz-2.1.6-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0305</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0305" source="CVE"/>
    <description>
    The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0306</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0306" source="CVE"/>
    <description>
    The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0308</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0308" source="CVE"/>
    <description>
    The imap-send command in GIT before 1.8.1.4 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079017" comment="git-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079018" comment="git-arch-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079019" comment="git-core-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079021" comment="git-cvs-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079022" comment="git-daemon-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079025" comment="git-email-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079026" comment="git-gui-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079027" comment="git-remote-helpers-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079028" comment="git-svn-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079029" comment="git-web-1.7.10.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079030" comment="gitk-1.7.10.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0333</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333" source="CVE"/>
    <description>
    lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078705" comment="rubygem-actionmailer-2_3-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078706" comment="rubygem-actionmailer-2_3-doc-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078707" comment="rubygem-actionmailer-2_3-testsuite-2.3.16-2.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078708" comment="rubygem-actionmailer-3_2-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078709" comment="rubygem-actionmailer-3_2-doc-3.2.11-2.9.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078710" comment="rubygem-actionmailer-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078711" comment="rubygem-actionpack-2_3-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078712" comment="rubygem-actionpack-2_3-doc-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078713" comment="rubygem-actionpack-2_3-testsuite-2.3.16-2.13.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078714" comment="rubygem-actionpack-3_2-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078715" comment="rubygem-actionpack-3_2-doc-3.2.11-3.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078716" comment="rubygem-actionpack-2.3.16-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078717" comment="rubygem-activemodel-3_2-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078718" comment="rubygem-activemodel-3_2-doc-3.2.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078719" comment="rubygem-activerecord-2_3-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078720" comment="rubygem-activerecord-2_3-doc-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078721" comment="rubygem-activerecord-2_3-testsuite-2.3.16-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078722" comment="rubygem-activerecord-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078723" comment="rubygem-activerecord-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078724" comment="rubygem-activerecord-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078725" comment="rubygem-activeresource-2_3-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078726" comment="rubygem-activeresource-2_3-doc-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078727" comment="rubygem-activeresource-2_3-testsuite-2.3.16-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078728" comment="rubygem-activeresource-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078729" comment="rubygem-activeresource-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078730" comment="rubygem-activeresource-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078731" comment="rubygem-activesupport-2_3-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078732" comment="rubygem-activesupport-2_3-doc-2.3.16-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078733" comment="rubygem-activesupport-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078734" comment="rubygem-activesupport-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078735" comment="rubygem-activesupport-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078736" comment="rubygem-rack-1_1-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078737" comment="rubygem-rack-1_1-doc-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078738" comment="rubygem-rack-1_1-testsuite-1.1.5-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078739" comment="rubygem-rack-1_2-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078740" comment="rubygem-rack-1_2-doc-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078741" comment="rubygem-rack-1_2-testsuite-1.2.7-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078742" comment="rubygem-rack-1_3-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078743" comment="rubygem-rack-1_3-doc-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078744" comment="rubygem-rack-1_3-testsuite-1.3.9-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078745" comment="rubygem-rack-1_4-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078746" comment="rubygem-rack-1_4-doc-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078747" comment="rubygem-rack-1_4-testsuite-1.4.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078748" comment="rubygem-rails-2_3-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078749" comment="rubygem-rails-2_3-doc-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078750" comment="rubygem-rails-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078751" comment="rubygem-rails-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078752" comment="rubygem-rails-2.3.16-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078753" comment="rubygem-railties-3_2-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078754" comment="rubygem-railties-3_2-doc-3.2.11-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078755" comment="rubygem-sprockets-2_2-2.2.2-2.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078756" comment="rubygem-sprockets-2_2-doc-2.2.2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079304" comment="libxml2-2-2.7.8+git20120223-8.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079305" comment="libxml2-2-32bit-2.7.8+git20120223-8.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079308" comment="libxml2-2.7.8+git20120223-8.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079310" comment="libxml2-devel-2.7.8+git20120223-8.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079311" comment="libxml2-devel-32bit-2.7.8+git20120223-8.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079312" comment="libxml2-doc-2.7.8+git20120223-8.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079313" comment="libxml2-tools-2.7.8+git20120223-8.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079315" comment="python-libxml2-2.7.8+git20120223-8.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0348</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0348" source="CVE"/>
    <description>
    thttpd.c in sthttpd before 2.26.4-r2 and thttpd 2.25b use world-readable permissions for /var/log/thttpd.log, which allows local users to obtain sensitive information by reading the file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091894" comment="thttpd-2.25b-192.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0420</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0420" source="CVE"/>
    <description>
    Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core.  NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has not commented on claims from another vendor that this issue is related to an incorrect comparison in the vga_draw_text function in Devices/Graphics/DevVGA.cpp, which can cause VirtualBox to "draw more lines than necessary."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078596" comment="python-virtualbox-4.1.22-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078598" comment="virtualbox-4.1.22-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078601" comment="virtualbox-devel-4.1.22-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078602" comment="virtualbox-guest-kmp-default-4.1.22_k3.4.11_2.16-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078604" comment="virtualbox-guest-kmp-desktop-4.1.22_k3.4.11_2.16-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078606" comment="virtualbox-guest-kmp-pae-4.1.22_k3.4.11_2.16-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078608" comment="virtualbox-guest-tools-4.1.22-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078610" comment="virtualbox-guest-x11-4.1.22-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078612" comment="virtualbox-host-kmp-default-4.1.22_k3.4.11_2.16-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078614" comment="virtualbox-host-kmp-desktop-4.1.22_k3.4.11_2.16-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078616" comment="virtualbox-host-kmp-pae-4.1.22_k3.4.11_2.16-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078618" comment="virtualbox-qt-4.1.22-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078620" comment="virtualbox-websrv-4.1.22-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0422</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422" source="CVE"/>
    <description>
    Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114.  CVE-2013-0422 covers both the JMX/MBean and Reflection API issues.  NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks.  NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11.  If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078570" comment="java-1_7_0-openjdk-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078573" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078575" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078577" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078578" comment="java-1_7_0-openjdk-src-1.7.0.6-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0424</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0425</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0426</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0427</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0428</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0429</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0429" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0431</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0432</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0433</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0434</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0435</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0440</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0441</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0442</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0443</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0444</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0444" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient checks for cached results" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0450</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0454</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454" source="CVE"/>
    <description>
    The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079839" comment="samba-doc-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079840" comment="ldapsmb-1.34b-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079841" comment="libnetapi-devel-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079842" comment="libnetapi0-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079844" comment="libsmbclient-devel-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079845" comment="libsmbclient0-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079846" comment="libsmbclient0-32bit-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079849" comment="libsmbsharemodes-devel-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079850" comment="libsmbsharemodes0-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079852" comment="libwbclient-devel-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079853" comment="libwbclient0-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079854" comment="libwbclient0-32bit-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079857" comment="samba-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079858" comment="samba-32bit-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079859" comment="samba-client-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079860" comment="samba-client-32bit-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079866" comment="samba-devel-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079867" comment="samba-krb-printing-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079869" comment="samba-winbind-3.6.7-48.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079870" comment="samba-winbind-32bit-3.6.7-48.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
    <description>
    The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
    <description>
    The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
    <description>
    The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
    <description>
    Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0751</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
    <description>
    Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
    <description>
    Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0759</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
    <description>
    Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
    <description>
    The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0765</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
    <description>
    The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
    <description>
    Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078458" comment="MozillaFirefox-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078459" comment="MozillaFirefox-branding-upstream-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078460" comment="MozillaFirefox-buildsymbols-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078463" comment="MozillaFirefox-devel-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078464" comment="MozillaFirefox-translations-common-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078465" comment="MozillaFirefox-translations-other-18.0-2.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078466" comment="MozillaThunderbird-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078467" comment="MozillaThunderbird-buildsymbols-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078470" comment="MozillaThunderbird-devel-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078472" comment="MozillaThunderbird-translations-common-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078473" comment="MozillaThunderbird-translations-other-17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078474" comment="enigmail-1.5.0+17.0.2-49.27.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078476" comment="mozilla-nspr-32bit-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078477" comment="mozilla-nspr-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078481" comment="mozilla-nspr-devel-4.9.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078482" comment="libfreebl3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078483" comment="libfreebl3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078486" comment="libsoftokn3-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078487" comment="libsoftokn3-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078490" comment="mozilla-nss-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078491" comment="mozilla-nss-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078492" comment="mozilla-nss-certs-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078493" comment="mozilla-nss-certs-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078499" comment="mozilla-nss-devel-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078500" comment="mozilla-nss-sysinit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078501" comment="mozilla-nss-sysinit-32bit-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078504" comment="mozilla-nss-tools-3.14.1-2.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078506" comment="seamonkey-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078509" comment="seamonkey-dom-inspector-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078510" comment="seamonkey-irc-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078511" comment="seamonkey-translations-common-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078512" comment="seamonkey-translations-other-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078513" comment="seamonkey-venkman-2.15-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078514" comment="mozilla-js-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078515" comment="mozilla-js-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078518" comment="xulrunner-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078519" comment="xulrunner-32bit-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078520" comment="xulrunner-buildsymbols-17.0.2-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078524" comment="xulrunner-devel-17.0.2-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0772</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772" source="CVE"/>
    <description>
    The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0777</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0777" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDisplayBoxShadowOuter::Paint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0778</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0778" source="CVE"/>
    <description>
    The ClusterIterator::NextCluster function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0779</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0779" source="CVE"/>
    <description>
    The nsCodingStateMachine::NextState function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0781</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0781" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsPrintEngine::CommonPrint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078927" comment="MozillaFirefox-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078928" comment="MozillaFirefox-branding-upstream-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078929" comment="MozillaFirefox-buildsymbols-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078932" comment="MozillaFirefox-devel-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078933" comment="MozillaFirefox-translations-common-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078934" comment="MozillaFirefox-translations-other-19.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078935" comment="MozillaThunderbird-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078936" comment="MozillaThunderbird-buildsymbols-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078939" comment="MozillaThunderbird-devel-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078941" comment="MozillaThunderbird-translations-common-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078942" comment="MozillaThunderbird-translations-other-17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078943" comment="enigmail-1.5.1+17.0.3-49.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078945" comment="chmsee-2.0-2.14.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078948" comment="seamonkey-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078951" comment="seamonkey-dom-inspector-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078952" comment="seamonkey-irc-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078953" comment="seamonkey-translations-common-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078954" comment="seamonkey-translations-other-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078955" comment="seamonkey-venkman-2.16-2.34.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078956" comment="mozilla-js-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078957" comment="mozilla-js-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078960" comment="xulrunner-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078961" comment="xulrunner-32bit-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078962" comment="xulrunner-buildsymbols-17.0.3-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078966" comment="xulrunner-devel-17.0.3-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079193" comment="MozillaFirefox-19.0.2-2.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079194" comment="MozillaFirefox-branding-upstream-19.0.2-2.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079195" comment="MozillaFirefox-buildsymbols-19.0.2-2.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079198" comment="MozillaFirefox-devel-19.0.2-2.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079199" comment="MozillaFirefox-translations-common-19.0.2-2.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079200" comment="MozillaFirefox-translations-other-19.0.2-2.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079230" comment="mozilla-js-17.0.4-2.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079231" comment="mozilla-js-32bit-17.0.4-2.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079234" comment="xulrunner-17.0.4-2.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079235" comment="xulrunner-32bit-17.0.4-2.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079236" comment="xulrunner-buildsymbols-17.0.4-2.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079240" comment="xulrunner-devel-17.0.4-2.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079242" comment="seamonkey-2.16.1-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079245" comment="seamonkey-dom-inspector-2.16.1-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079246" comment="seamonkey-irc-2.16.1-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079247" comment="seamonkey-translations-common-2.16.1-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079248" comment="seamonkey-translations-other-2.16.1-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079249" comment="seamonkey-venkman-2.16.1-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079266" comment="MozillaThunderbird-17.0.4-49.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079267" comment="MozillaThunderbird-buildsymbols-17.0.4-49.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079270" comment="MozillaThunderbird-devel-17.0.4-49.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079272" comment="MozillaThunderbird-translations-common-17.0.4-49.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079273" comment="MozillaThunderbird-translations-other-17.0.4-49.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079274" comment="enigmail-1.5.1+17.0.4-49.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
    <description>
    The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
    <description>
    The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
    <description>
    Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0801</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079290" comment="java-1_7_0-openjdk-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079293" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079295" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079297" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079298" comment="java-1_7_0-openjdk-src-1.7.0.6-3.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0830</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0830" source="CVE"/>
    <description>
    The IPC layer in Google Chrome before 24.0.1312.52 on Windows omits a NUL character required for termination of an unspecified data structure, which has unknown impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0831</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0831" source="CVE"/>
    <description>
    Directory traversal vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to have an unspecified impact by leveraging access to an extension process.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0832</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0832" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0833</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0833" source="CVE"/>
    <description>
    Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to printing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0834</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0834" source="CVE"/>
    <description>
    Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving glyphs.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0835</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0835" source="CVE"/>
    <description>
    Unspecified vulnerability in the Geolocation implementation in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0836</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0836" source="CVE"/>
    <description>
    Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0837</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0837" source="CVE"/>
    <description>
    Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0838</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0838" source="CVE"/>
    <description>
    Google Chrome before 24.0.1312.52 on Linux uses weak permissions for shared memory segments, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078585" comment="chromedriver-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078587" comment="chromium-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078590" comment="chromium-desktop-gnome-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078591" comment="chromium-desktop-kde-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078592" comment="chromium-ffmpegsumo-26.0.1383.0-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078594" comment="chromium-suid-helper-26.0.1383.0-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0879</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0879" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly implement web audio nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0880</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0880" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to databases.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0881</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0881" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via crafted data in the Matroska container format.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0882</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0882" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect memory access) or possibly have unspecified other impact via a large number of SVG parameters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0883</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0883" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0884</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0884" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly load Native Client (aka NaCl) code, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0885</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0885" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly restrict API privileges during interaction with the Chrome Web Store, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0886</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0886" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.99 on Mac OS X does not properly implement signal handling for Native Client (aka NaCl) code, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0887</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0887" source="CVE"/>
    <description>
    The developer-tools process in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly restrict privileges during interaction with a connected server, which has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0888</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0888" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to a "user gesture check for dangerous file downloads."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0889</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0889" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly enforce a user gesture requirement before proceeding with a file download, which might make it easier for remote attackers to execute arbitrary code via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0890</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0890" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service (memory corruption) or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0891</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0891" source="CVE"/>
    <description>
    Integer overflow in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a blob.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0892</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0892" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0893</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0893" source="CVE"/>
    <description>
    Race condition in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to media.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0894</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0894" source="CVE"/>
    <description>
    Buffer overflow in the vorbis_parse_setup_hdr_floors function in the Vorbis decoder in vorbisdec.c in libavcodec in FFmpeg through 1.1.3, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds array access) or possibly have unspecified other impact via vectors involving a zero value for a bark map size.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0895</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0895" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Linux, and before 25.0.1364.99 on Mac OS X, does not properly handle pathnames during copy operations, which might make it easier for remote attackers to execute arbitrary programs via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0896</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0896" source="CVE"/>
    <description>
    Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly manage memory during message handling for plug-ins, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0897</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0897" source="CVE"/>
    <description>
    Off-by-one error in the PDF functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service via a crafted document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0898</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0898" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0899</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0899" source="CVE"/>
    <description>
    Integer overflow in the padding implementation in the opus_packet_parse_impl function in src/opus_decoder.c in Opus before 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a long packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0900</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0900" source="CVE"/>
    <description>
    Race condition in the International Components for Unicode (ICU) functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079182" comment="chromedriver-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079184" comment="chromium-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079187" comment="chromium-desktop-gnome-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079188" comment="chromium-desktop-kde-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079189" comment="chromium-ffmpegsumo-27.0.1425.0-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079191" comment="chromium-suid-helper-27.0.1425.0-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1362</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1362" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in nrpc.c in Nagios Remote Plug-In Executor (NRPE) before 2.14 might allow remote attackers to execute arbitrary shell commands via "$()" shell metacharacters, which are processed by bash.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079250" comment="nagios-nrpe-2.12-30.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079253" comment="nagios-nrpe-doc-2.12-30.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079254" comment="nagios-plugins-nrpe-2.12-30.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079201" comment="krb5-doc-1.10.2-3.12.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079202" comment="krb5-mini-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079205" comment="krb5-mini-devel-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079206" comment="krb5-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079207" comment="krb5-32bit-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079208" comment="krb5-client-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079213" comment="krb5-devel-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079214" comment="krb5-devel-32bit-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079215" comment="krb5-plugin-kdb-ldap-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079217" comment="krb5-plugin-preauth-pkinit-1.10.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079219" comment="krb5-server-1.10.2-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1416</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416" source="CVE"/>
    <description>
    The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079688" comment="krb5-doc-1.10.2-3.16.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079689" comment="krb5-mini-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079692" comment="krb5-mini-devel-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079693" comment="krb5-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079694" comment="krb5-32bit-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079695" comment="krb5-client-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079700" comment="krb5-devel-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079701" comment="krb5-devel-32bit-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079702" comment="krb5-plugin-kdb-ldap-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079704" comment="krb5-plugin-preauth-pkinit-1.10.2-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079706" comment="krb5-server-1.10.2-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091511" comment="krb5-doc-1.10.2-3.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091512" comment="krb5-mini-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091513" comment="krb5-mini-devel-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091514" comment="krb5-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091515" comment="krb5-32bit-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091516" comment="krb5-client-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091517" comment="krb5-devel-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091518" comment="krb5-devel-32bit-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091519" comment="krb5-plugin-kdb-ldap-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091520" comment="krb5-plugin-preauth-pkinit-1.10.2-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091521" comment="krb5-server-1.10.2-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1431</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1431" source="CVE"/>
    <description>
    The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080120" comment="telepathy-gabble-0.16.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080123" comment="telepathy-gabble-xmpp-console-0.16.0-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1432</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" source="CVE"/>
    <description>
    Xen 4.1.x and 4.2.x, when the XSA-45 patch is in place, does not properly maintain references on pages stored for deferred cleanup, which allows local PV guest kernels to cause a denial of service (premature page free and hypervisor crash) or possible gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1434</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1434" source="CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in (1) api_poller.php and (2) utility.php in Cacti before 0.8.8b allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090305" comment="cacti-0.8.8b-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1435</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1435" source="CVE"/>
    <description>
    (1) snmp.php and (2) rrd.php in Cacti before 0.8.8b allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090305" comment="cacti-0.8.8b-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091220" comment="xen-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091221" comment="xen-devel-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091222" comment="xen-kmp-default-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091223" comment="xen-kmp-desktop-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091224" comment="xen-kmp-pae-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091225" comment="xen-libs-32bit-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091226" comment="xen-libs-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091227" comment="xen-tools-domU-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091228" comment="xen-doc-html-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091229" comment="xen-doc-pdf-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091230" comment="xen-tools-4.1.6_01-5.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1443</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1443" source="CVE"/>
    <description>
    The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090759" comment="python-django-1.4.8-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1475</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1475" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1476</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1478</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1480</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078968" comment="java-1_7_0-openjdk-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078971" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078973" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078975" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078976" comment="java-1_7_0-openjdk-src-1.7.0.6-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1488</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
    <description>
    The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079290" comment="java-1_7_0-openjdk-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079293" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079295" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079297" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079298" comment="java-1_7_0-openjdk-src-1.7.0.6-3.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1518</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1519</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1519" source="CVE"/>
    <description>
    Unspecified vulnerability in the Application Express component in Oracle Database Server before 4.2.1 allows remote attackers to affect integrity via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090377" comment="libpixman-1-0-0.24.4-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090378" comment="libpixman-1-0-32bit-0.24.4-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090381" comment="libpixman-1-0-devel-0.24.4-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090382" comment="pixman-0.24.4-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
    <description>
    The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
    <description>
    The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
    <description>
    The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
    <description>
    The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
    <description>
    The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
    <description>
    The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
    <description>
    The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
    <description>
    The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
    <description>
    The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
    <description>
    The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
    <description>
    The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
    <description>
    The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
    <description>
    The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
    <description>
    epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
    <description>
    The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1587</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587" source="CVE"/>
    <description>
    The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
    <description>
    Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
    <description>
    Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
    <description>
    Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009078701" comment="wireshark-1.8.5-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009078704" comment="wireshark-devel-1.8.5-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1591</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1591" source="CVE"/>
    <description>
    Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors.  NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090377" comment="libpixman-1-0-0.24.4-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090378" comment="libpixman-1-0-32bit-0.24.4-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090381" comment="libpixman-1-0-devel-0.24.4-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090382" comment="pixman-0.24.4-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1619</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619" source="CVE"/>
    <description>
    The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079807" comment="gnutls-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079810" comment="libgnutls-devel-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079811" comment="libgnutls-devel-32bit-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079812" comment="libgnutls-openssl-devel-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079813" comment="libgnutls-openssl27-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079815" comment="libgnutls28-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079816" comment="libgnutls28-32bit-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079819" comment="libgnutlsxx-devel-3.0.20-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079820" comment="libgnutlsxx28-3.0.20-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1620</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620" source="CVE"/>
    <description>
    The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079455" comment="MozillaFirefox-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079456" comment="MozillaFirefox-branding-upstream-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079457" comment="MozillaFirefox-buildsymbols-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079460" comment="MozillaFirefox-devel-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079461" comment="MozillaFirefox-translations-common-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079462" comment="MozillaFirefox-translations-other-20.0-2.41.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079463" comment="MozillaThunderbird-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079464" comment="MozillaThunderbird-buildsymbols-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079467" comment="MozillaThunderbird-devel-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079469" comment="MozillaThunderbird-translations-common-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079470" comment="MozillaThunderbird-translations-other-17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079471" comment="enigmail-1.5.1+17.0.5-49.39.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079473" comment="mozilla-nspr-32bit-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079474" comment="mozilla-nspr-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079478" comment="mozilla-nspr-devel-4.9.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079479" comment="libfreebl3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079480" comment="libfreebl3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079483" comment="libsoftokn3-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079484" comment="libsoftokn3-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079487" comment="mozilla-nss-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079488" comment="mozilla-nss-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079489" comment="mozilla-nss-certs-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079490" comment="mozilla-nss-certs-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079496" comment="mozilla-nss-devel-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079497" comment="mozilla-nss-sysinit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079498" comment="mozilla-nss-sysinit-32bit-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079501" comment="mozilla-nss-tools-3.14.3-2.19.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079503" comment="mozilla-js-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079504" comment="mozilla-js-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079507" comment="xulrunner-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079508" comment="xulrunner-32bit-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079509" comment="xulrunner-buildsymbols-17.0.5-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079513" comment="xulrunner-devel-17.0.5-2.38.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1635</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635" source="CVE"/>
    <description>
    ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080501" comment="apache2-mod_php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080503" comment="php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080504" comment="php5-bcmath-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080506" comment="php5-bz2-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080508" comment="php5-calendar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080510" comment="php5-ctype-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080512" comment="php5-curl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080514" comment="php5-dba-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080518" comment="php5-devel-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080519" comment="php5-dom-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080521" comment="php5-enchant-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080523" comment="php5-exif-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080525" comment="php5-fastcgi-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080527" comment="php5-fileinfo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080529" comment="php5-fpm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080531" comment="php5-ftp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080533" comment="php5-gd-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080535" comment="php5-gettext-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080537" comment="php5-gmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080539" comment="php5-iconv-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080541" comment="php5-imap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080543" comment="php5-intl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080545" comment="php5-json-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080547" comment="php5-ldap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080549" comment="php5-mbstring-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080551" comment="php5-mcrypt-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080553" comment="php5-mssql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080555" comment="php5-mysql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080557" comment="php5-odbc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080559" comment="php5-openssl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080561" comment="php5-pcntl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080563" comment="php5-pdo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080565" comment="php5-pear-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080566" comment="php5-pgsql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080568" comment="php5-phar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080570" comment="php5-posix-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080572" comment="php5-pspell-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080574" comment="php5-readline-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080576" comment="php5-shmop-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080578" comment="php5-snmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080580" comment="php5-soap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080582" comment="php5-sockets-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080584" comment="php5-sqlite-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080586" comment="php5-suhosin-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080588" comment="php5-sysvmsg-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080590" comment="php5-sysvsem-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080592" comment="php5-sysvshm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080594" comment="php5-tidy-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080596" comment="php5-tokenizer-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080598" comment="php5-wddx-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080600" comment="php5-xmlreader-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080602" comment="php5-xmlrpc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080604" comment="php5-xmlwriter-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080606" comment="php5-xsl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080608" comment="php5-zip-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080610" comment="php5-zlib-5.3.15-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1640</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1640" source="CVE"/>
    <description>
    The (1) template and (2) inline_template functions in the master server in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users to execute arbitrary code via a crafted catalog request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1643</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643" source="CVE"/>
    <description>
    The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080501" comment="apache2-mod_php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080503" comment="php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080504" comment="php5-bcmath-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080506" comment="php5-bz2-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080508" comment="php5-calendar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080510" comment="php5-ctype-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080512" comment="php5-curl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080514" comment="php5-dba-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080518" comment="php5-devel-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080519" comment="php5-dom-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080521" comment="php5-enchant-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080523" comment="php5-exif-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080525" comment="php5-fastcgi-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080527" comment="php5-fileinfo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080529" comment="php5-fpm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080531" comment="php5-ftp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080533" comment="php5-gd-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080535" comment="php5-gettext-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080537" comment="php5-gmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080539" comment="php5-iconv-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080541" comment="php5-imap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080543" comment="php5-intl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080545" comment="php5-json-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080547" comment="php5-ldap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080549" comment="php5-mbstring-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080551" comment="php5-mcrypt-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080553" comment="php5-mssql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080555" comment="php5-mysql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080557" comment="php5-odbc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080559" comment="php5-openssl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080561" comment="php5-pcntl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080563" comment="php5-pdo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080565" comment="php5-pear-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080566" comment="php5-pgsql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080568" comment="php5-phar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080570" comment="php5-posix-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080572" comment="php5-pspell-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080574" comment="php5-readline-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080576" comment="php5-shmop-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080578" comment="php5-snmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080580" comment="php5-soap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080582" comment="php5-sockets-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080584" comment="php5-sqlite-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080586" comment="php5-suhosin-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080588" comment="php5-sysvmsg-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080590" comment="php5-sysvsem-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080592" comment="php5-sysvshm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080594" comment="php5-tidy-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080596" comment="php5-tokenizer-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080598" comment="php5-wddx-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080600" comment="php5-xmlreader-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080602" comment="php5-xmlrpc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080604" comment="php5-xmlwriter-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080606" comment="php5-xsl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080608" comment="php5-zip-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080610" comment="php5-zlib-5.3.15-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1652</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1652" source="CVE"/>
    <description>
    Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's cache via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1653</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1653" source="CVE"/>
    <description>
    Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1654</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1654" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1655</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1655" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1665</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665" source="CVE"/>
    <description>
    The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex and Folsom, Django, and possibly other products allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
    <description>
    The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079256" comment="perl-32bit-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079257" comment="perl-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079258" comment="perl-base-32bit-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079259" comment="perl-base-5.16.0-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079265" comment="perl-doc-5.16.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1669</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1670</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1671</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1674</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code via vectors involving an onresize event during the playing of a video.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1675</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1676</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676" source="CVE"/>
    <description>
    The SelectionIterator::GetNextSegment function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1677</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677" source="CVE"/>
    <description>
    The gfxSkipCharsIterator::SetOffsets function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1678</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678" source="CVE"/>
    <description>
    The _cairo_xlib_surface_add_glyph function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1679</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::plugins::child::_geturlnotify function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1680</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1681</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::RemoveScriptBlocker function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079873" comment="MozillaFirefox-branding-openSUSE-21-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079874" comment="MozillaFirefox-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079875" comment="MozillaFirefox-branding-upstream-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079876" comment="MozillaFirefox-buildsymbols-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079879" comment="MozillaFirefox-devel-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079880" comment="MozillaFirefox-translations-common-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079881" comment="MozillaFirefox-translations-other-21.0-2.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079882" comment="MozillaThunderbird-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079883" comment="MozillaThunderbird-buildsymbols-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079886" comment="MozillaThunderbird-devel-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079888" comment="MozillaThunderbird-translations-common-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079889" comment="MozillaThunderbird-translations-other-17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079890" comment="enigmail-1.5.1+17.0.6-49.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079892" comment="mozilla-js-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079893" comment="mozilla-js-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079896" comment="xulrunner-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079897" comment="xulrunner-32bit-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079898" comment="xulrunner-buildsymbols-17.0.6-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079902" comment="xulrunner-devel-17.0.6-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1683</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1683" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1688</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1688" source="CVE"/>
    <description>
    The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1694</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694" source="CVE"/>
    <description>
    The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1695</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1695" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1696</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1696" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080300" comment="MozillaThunderbird-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080301" comment="MozillaThunderbird-buildsymbols-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080304" comment="MozillaThunderbird-devel-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080306" comment="MozillaThunderbird-translations-common-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080307" comment="MozillaThunderbird-translations-other-17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080308" comment="enigmail-1.5.1+17.0.7-49.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080310" comment="mozilla-js-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080311" comment="mozilla-js-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080314" comment="xulrunner-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080315" comment="xulrunner-32bit-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080316" comment="xulrunner-buildsymbols-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080320" comment="xulrunner-devel-17.0.7-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1698</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1698" source="CVE"/>
    <description>
    The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1699</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1699" source="CVE"/>
    <description>
    The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080292" comment="MozillaFirefox-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080293" comment="MozillaFirefox-branding-upstream-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080294" comment="MozillaFirefox-buildsymbols-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080297" comment="MozillaFirefox-devel-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080298" comment="MozillaFirefox-translations-common-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080299" comment="MozillaFirefox-translations-other-22.0-2.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080363" comment="seamonkey-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080366" comment="seamonkey-dom-inspector-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080367" comment="seamonkey-irc-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080368" comment="seamonkey-translations-common-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080369" comment="seamonkey-translations-other-2.19-2.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080370" comment="seamonkey-venkman-2.19-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1704</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1708</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1711</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090049" comment="MozillaFirefox-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090050" comment="MozillaFirefox-branding-upstream-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090051" comment="MozillaFirefox-buildsymbols-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090054" comment="MozillaFirefox-devel-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090055" comment="MozillaFirefox-translations-common-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090056" comment="MozillaFirefox-translations-other-23.0-2.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090057" comment="MozillaThunderbird-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090058" comment="MozillaThunderbird-buildsymbols-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090061" comment="MozillaThunderbird-devel-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090063" comment="MozillaThunderbird-translations-common-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090064" comment="MozillaThunderbird-translations-other-17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090065" comment="enigmail-1.5.2+17.0.8-49.51.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090067" comment="mozilla-nspr-32bit-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090068" comment="mozilla-nspr-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090072" comment="mozilla-nspr-devel-4.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090073" comment="libfreebl3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090074" comment="libfreebl3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090077" comment="libsoftokn3-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090078" comment="libsoftokn3-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090081" comment="mozilla-nss-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090082" comment="mozilla-nss-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090083" comment="mozilla-nss-certs-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090084" comment="mozilla-nss-certs-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090090" comment="mozilla-nss-devel-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090091" comment="mozilla-nss-sysinit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090092" comment="mozilla-nss-sysinit-32bit-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090095" comment="mozilla-nss-tools-3.15.1-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090097" comment="seamonkey-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090100" comment="seamonkey-dom-inspector-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090101" comment="seamonkey-irc-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090102" comment="seamonkey-translations-common-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090103" comment="seamonkey-translations-other-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090104" comment="seamonkey-venkman-2.20-2.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090105" comment="mozilla-js-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090106" comment="mozilla-js-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090109" comment="xulrunner-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090110" comment="xulrunner-32bit-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090111" comment="xulrunner-buildsymbols-17.0.8-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090115" comment="xulrunner-devel-17.0.8-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1719</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1719" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1720</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720" source="CVE"/>
    <description>
    The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1721</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721" source="CVE"/>
    <description>
    Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1723</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723" source="CVE"/>
    <description>
    The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1724</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1728</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728" source="CVE"/>
    <description>
    The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1738</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090735" comment="MozillaFirefox-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090736" comment="MozillaFirefox-branding-upstream-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090737" comment="MozillaFirefox-buildsymbols-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090740" comment="MozillaFirefox-devel-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090741" comment="MozillaFirefox-translations-common-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090742" comment="MozillaFirefox-translations-other-24.0-2.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090743" comment="MozillaThunderbird-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090744" comment="MozillaThunderbird-buildsymbols-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090747" comment="MozillaThunderbird-devel-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090748" comment="MozillaThunderbird-translations-common-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090749" comment="MozillaThunderbird-translations-other-24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090750" comment="enigmail-1.5.2+24.0-49.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090751" comment="seamonkey-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090754" comment="seamonkey-dom-inspector-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090755" comment="seamonkey-irc-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090756" comment="seamonkey-translations-common-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090757" comment="seamonkey-translations-other-2.21-2.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090758" comment="seamonkey-venkman-2.21-2.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090960" comment="libfreebl3-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090961" comment="libfreebl3-32bit-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090962" comment="libsoftokn3-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090963" comment="libsoftokn3-32bit-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090964" comment="mozilla-nss-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090965" comment="mozilla-nss-32bit-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090966" comment="mozilla-nss-certs-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090967" comment="mozilla-nss-certs-32bit-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090968" comment="mozilla-nss-devel-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090969" comment="mozilla-nss-sysinit-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090970" comment="mozilla-nss-sysinit-32bit-3.15.2-2.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090971" comment="mozilla-nss-tools-3.15.2-2.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1763</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1763" source="CVE"/>
    <description>
    Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079093" comment="kernel-debug-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079094" comment="kernel-debug-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079098" comment="kernel-debug-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079100" comment="kernel-default-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079101" comment="kernel-default-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079105" comment="kernel-default-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079107" comment="kernel-desktop-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079108" comment="kernel-desktop-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079112" comment="kernel-desktop-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079114" comment="kernel-docs-3.4.33-2.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079115" comment="kernel-ec2-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079116" comment="kernel-ec2-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079120" comment="kernel-ec2-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079122" comment="kernel-ec2-extra-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079124" comment="kernel-pae-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079125" comment="kernel-pae-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079129" comment="kernel-pae-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079131" comment="kernel-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079132" comment="kernel-source-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079133" comment="kernel-source-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079134" comment="kernel-syms-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079135" comment="kernel-trace-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079136" comment="kernel-trace-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079140" comment="kernel-trace-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079142" comment="kernel-vanilla-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079145" comment="kernel-vanilla-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079147" comment="kernel-xen-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079148" comment="kernel-xen-base-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079152" comment="kernel-xen-devel-3.4.33-2.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1767</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767" source="CVE"/>
    <description>
    Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1769</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1769" source="CVE"/>
    <description>
    A certain hashing algorithm in Telepathy Gabble 0.16.x before 0.16.5 and 0.17.x before 0.17.3 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079299" comment="telepathy-gabble-0.16.0-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079302" comment="telepathy-gabble-xmpp-console-0.16.0-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1774</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774" source="CVE"/>
    <description>
    The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079154" comment="sudo-1.8.5p2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079157" comment="sudo-devel-1.8.5p2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079154" comment="sudo-1.8.5p2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079157" comment="sudo-devel-1.8.5p2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1796</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796" source="CVE"/>
    <description>
    The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1797</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797" source="CVE"/>
    <description>
    Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1798</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798" source="CVE"/>
    <description>
    The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1819</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1819" source="CVE"/>
    <description>
    The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1821</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821" source="CVE"/>
    <description>
    lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079363" comment="ruby-1.9.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079364" comment="ruby-common-1.9.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079365" comment="ruby-devel-1.9.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079366" comment="ruby19-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079369" comment="ruby19-devel-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079370" comment="ruby19-devel-extra-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079371" comment="ruby19-doc-ri-1.9.3.p392-3.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079372" comment="ruby19-tk-1.9.3.p392-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1845</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079555" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079557" comment="libsvn_auth_kwallet-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079559" comment="subversion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079560" comment="subversion-bash-completion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079563" comment="subversion-devel-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079564" comment="subversion-perl-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079566" comment="subversion-python-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079568" comment="subversion-server-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079570" comment="subversion-tools-1.7.9-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1846</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079555" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079557" comment="libsvn_auth_kwallet-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079559" comment="subversion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079560" comment="subversion-bash-completion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079563" comment="subversion-devel-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079564" comment="subversion-perl-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079566" comment="subversion-python-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079568" comment="subversion-server-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079570" comment="subversion-tools-1.7.9-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1847</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079555" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079557" comment="libsvn_auth_kwallet-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079559" comment="subversion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079560" comment="subversion-bash-completion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079563" comment="subversion-devel-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079564" comment="subversion-perl-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079566" comment="subversion-python-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079568" comment="subversion-server-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079570" comment="subversion-tools-1.7.9-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1848</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848" source="CVE"/>
    <description>
    fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079717" comment="kernel-debug-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079718" comment="kernel-debug-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079722" comment="kernel-debug-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079724" comment="kernel-default-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079725" comment="kernel-default-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079729" comment="kernel-default-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079731" comment="kernel-desktop-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079732" comment="kernel-desktop-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079736" comment="kernel-desktop-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079738" comment="kernel-docs-3.4.42-2.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079739" comment="kernel-ec2-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079740" comment="kernel-ec2-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079744" comment="kernel-ec2-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079746" comment="kernel-ec2-extra-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079748" comment="kernel-pae-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079749" comment="kernel-pae-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079753" comment="kernel-pae-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079755" comment="kernel-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079756" comment="kernel-source-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079757" comment="kernel-source-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079758" comment="kernel-syms-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079759" comment="kernel-trace-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079760" comment="kernel-trace-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079764" comment="kernel-trace-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079766" comment="kernel-vanilla-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079769" comment="kernel-vanilla-devel-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079771" comment="kernel-xen-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079772" comment="kernel-xen-base-3.4.42-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079776" comment="kernel-xen-devel-3.4.42-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1849</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079555" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079557" comment="libsvn_auth_kwallet-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079559" comment="subversion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079560" comment="subversion-bash-completion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079563" comment="subversion-devel-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079564" comment="subversion-perl-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079566" comment="subversion-python-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079568" comment="subversion-server-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079570" comment="subversion-tools-1.7.9-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1853</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1853" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093057" comment="almanah-0.9.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093058" comment="almanah-lang-0.9.1-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1854</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1854" source="CVE"/>
    <description>
    The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079520" comment="rubygem-activerecord-2_3-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079521" comment="rubygem-activerecord-2_3-doc-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079522" comment="rubygem-activerecord-2_3-testsuite-2.3.17-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079523" comment="rubygem-activerecord-3_2-3.2.12-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079524" comment="rubygem-activerecord-3_2-doc-3.2.12-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079525" comment="rubygem-activesupport-2_3-2.3.17-3.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079526" comment="rubygem-activesupport-2_3-doc-2.3.17-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1855</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1855" source="CVE"/>
    <description>
    The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079515" comment="rubygem-actionpack-2_3-2.3.17-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079516" comment="rubygem-actionpack-2_3-doc-2.3.17-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079517" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079518" comment="rubygem-actionpack-3_2-3.2.12-3.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079519" comment="rubygem-actionpack-3_2-doc-3.2.12-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1857</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1857" source="CVE"/>
    <description>
    The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a &amp;#x3a; sequence.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079515" comment="rubygem-actionpack-2_3-2.3.17-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079516" comment="rubygem-actionpack-2_3-doc-2.3.17-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079517" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079518" comment="rubygem-actionpack-3_2-3.2.12-3.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079519" comment="rubygem-actionpack-3_2-doc-3.2.12-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1862</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862" source="CVE"/>
    <description>
    mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089848" comment="apache2-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089851" comment="apache2-devel-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089852" comment="apache2-doc-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089853" comment="apache2-event-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089855" comment="apache2-example-pages-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089856" comment="apache2-itk-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089858" comment="apache2-prefork-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089860" comment="apache2-utils-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089862" comment="apache2-worker-2.2.22-4.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1872</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1872" source="CVE"/>
    <description>
    The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of service (reachable assertion and crash) and possibly execute arbitrary code via vectors involving 3d graphics that trigger an out-of-bounds array access, related to the fs_visitor::remove_dead_constants function.  NOTE: this issue might be related to CVE-2013-0796.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080371" comment="Mesa-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080372" comment="Mesa-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080376" comment="Mesa-devel-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080377" comment="Mesa-devel-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080378" comment="Mesa-libEGL-devel-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080379" comment="Mesa-libEGL-devel-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080380" comment="Mesa-libEGL1-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080381" comment="Mesa-libEGL1-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080384" comment="Mesa-libGL-devel-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080385" comment="Mesa-libGL-devel-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080386" comment="Mesa-libGL1-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080387" comment="Mesa-libGL1-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080390" comment="Mesa-libGLESv1_CM-devel-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080391" comment="Mesa-libGLESv1_CM-devel-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080392" comment="Mesa-libGLESv1_CM1-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080393" comment="Mesa-libGLESv1_CM1-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080396" comment="Mesa-libGLESv2-2-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080397" comment="Mesa-libGLESv2-2-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080400" comment="Mesa-libGLESv2-devel-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080401" comment="Mesa-libGLESv2-devel-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080402" comment="Mesa-libGLU-devel-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080403" comment="Mesa-libGLU-devel-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080404" comment="Mesa-libGLU1-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080405" comment="Mesa-libGLU1-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080408" comment="Mesa-libIndirectGL1-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080409" comment="Mesa-libIndirectGL1-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080412" comment="Mesa-libglapi0-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080413" comment="Mesa-libglapi0-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080416" comment="libOSMesa8-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080417" comment="libOSMesa8-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080420" comment="libXvMC_nouveau-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080421" comment="libXvMC_nouveau-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080424" comment="libXvMC_r300-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080425" comment="libXvMC_r300-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080428" comment="libXvMC_r600-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080429" comment="libXvMC_r600-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080432" comment="libXvMC_softpipe-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080433" comment="libXvMC_softpipe-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080436" comment="libgbm-devel-0.0.0-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080437" comment="libgbm-devel-32bit-0.0.0-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080438" comment="libgbm1-0.0.0-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080439" comment="libgbm1-32bit-0.0.0-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080442" comment="libvdpau_nouveau-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080443" comment="libvdpau_nouveau-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080446" comment="libvdpau_r300-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080447" comment="libvdpau_r300-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080450" comment="libvdpau_r600-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080451" comment="libvdpau_r600-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080454" comment="libvdpau_softpipe-32bit-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080455" comment="libvdpau_softpipe-8.0.4-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080458" comment="libxatracker-devel-1.0.0-20.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080459" comment="libxatracker1-1.0.0-20.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092007" comment="gtk3-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092008" comment="gtk3-branding-upstream-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092009" comment="gtk3-data-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092010" comment="gtk3-devel-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092011" comment="gtk3-immodule-amharic-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092012" comment="gtk3-immodule-amharic-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092013" comment="gtk3-immodule-inuktitut-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092014" comment="gtk3-immodule-inuktitut-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092015" comment="gtk3-immodule-multipress-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092016" comment="gtk3-immodule-multipress-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092017" comment="gtk3-immodule-thai-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092018" comment="gtk3-immodule-thai-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092019" comment="gtk3-immodule-vietnamese-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092020" comment="gtk3-immodule-vietnamese-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092021" comment="gtk3-immodule-xim-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092022" comment="gtk3-immodule-xim-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092023" comment="gtk3-immodules-tigrigna-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092024" comment="gtk3-immodules-tigrigna-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092025" comment="gtk3-lang-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092026" comment="gtk3-tools-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092027" comment="gtk3-tools-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092028" comment="libgtk-3-0-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092029" comment="libgtk-3-0-32bit-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092030" comment="typelib-1_0-Gtk-3_0-3.4.4-2.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092031" comment="gdk-pixbuf-loader-rsvg-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092032" comment="gdk-pixbuf-loader-rsvg-32bit-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092033" comment="gtk2-engine-svg-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092034" comment="gtk2-engine-svg-32bit-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092035" comment="librsvg-2-2-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092036" comment="librsvg-2-2-32bit-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092037" comment="librsvg-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092038" comment="librsvg-devel-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092039" comment="rsvg-view-2.36.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092040" comment="typelib-1_0-Rsvg-2_0-2.36.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1884</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079555" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079557" comment="libsvn_auth_kwallet-1-0-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079559" comment="subversion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079560" comment="subversion-bash-completion-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079563" comment="subversion-devel-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079564" comment="subversion-perl-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079566" comment="subversion-python-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079568" comment="subversion-server-1.7.9-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079570" comment="subversion-tools-1.7.9-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1896</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896" source="CVE"/>
    <description>
    mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089848" comment="apache2-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089851" comment="apache2-devel-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089852" comment="apache2-doc-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089853" comment="apache2-event-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089855" comment="apache2-example-pages-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089856" comment="apache2-itk-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089858" comment="apache2-prefork-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089860" comment="apache2-utils-2.2.22-4.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089862" comment="apache2-worker-2.2.22-4.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079527" comment="libecpg6-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079528" comment="libecpg6-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079531" comment="libpq5-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079532" comment="libpq5-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079535" comment="postgresql91-devel-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079536" comment="postgresql91-devel-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079539" comment="postgresql91-libs-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079541" comment="postgresql91-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079542" comment="postgresql91-contrib-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079546" comment="postgresql91-docs-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079547" comment="postgresql91-plperl-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079549" comment="postgresql91-plpython-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079551" comment="postgresql91-pltcl-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079553" comment="postgresql91-server-9.1.9-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079527" comment="libecpg6-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079528" comment="libecpg6-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079531" comment="libpq5-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079532" comment="libpq5-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079535" comment="postgresql91-devel-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079536" comment="postgresql91-devel-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079539" comment="postgresql91-libs-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079541" comment="postgresql91-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079542" comment="postgresql91-contrib-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079546" comment="postgresql91-docs-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079547" comment="postgresql91-plperl-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079549" comment="postgresql91-plpython-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079551" comment="postgresql91-pltcl-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079553" comment="postgresql91-server-9.1.9-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079527" comment="libecpg6-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079528" comment="libecpg6-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079531" comment="libpq5-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079532" comment="libpq5-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079535" comment="postgresql91-devel-32bit-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079536" comment="postgresql91-devel-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079539" comment="postgresql91-libs-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079541" comment="postgresql91-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079542" comment="postgresql91-contrib-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079546" comment="postgresql91-docs-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079547" comment="postgresql91-plperl-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079549" comment="postgresql91-plpython-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079551" comment="postgresql91-pltcl-9.1.9-20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079553" comment="postgresql91-server-9.1.9-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1904</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1904" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079454" comment="roundcubemail-0.8.6-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1915</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915" source="CVE"/>
    <description>
    ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089867" comment="apache2-mod_security2-2.7.5-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1920</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920" source="CVE"/>
    <description>
    Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1923</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923" source="CVE"/>
    <description>
    rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079973" comment="nfs-client-1.2.6-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079975" comment="nfs-doc-1.2.6-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079976" comment="nfs-kernel-server-1.2.6-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079978" comment="nfs-utils-1.2.6-2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1926</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079670" comment="icedtea-web-1.3.2-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079673" comment="icedtea-web-javadoc-1.3.2-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079822" comment="icedtea-web-1.4-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079825" comment="icedtea-web-javadoc-1.4-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1927</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079670" comment="icedtea-web-1.3.2-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079673" comment="icedtea-web-javadoc-1.3.2-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079822" comment="icedtea-web-1.4-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079825" comment="icedtea-web-javadoc-1.4-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1937</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1937" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080256" comment="phpMyAdmin-3.5.8.1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079778" comment="xorg-x11-Xvnc-7.6_1.12.3-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079780" comment="xorg-x11-server-7.6_1.12.3-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079783" comment="xorg-x11-server-extra-7.6_1.12.3-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079785" comment="xorg-x11-server-sdk-7.6_1.12.3-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079572" comment="curl-7.25.0-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079575" comment="libcurl-devel-7.25.0-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079576" comment="libcurl4-32bit-7.25.0-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079577" comment="libcurl4-7.25.0-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1953</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1953" source="CVE"/>
    <description>
    Integer underflow in the input_bmp_reader function in input-bmp.c in AutoTrace 0.31.1 allows context-dependent attackers to have an unspecified impact via a small value in the biSize field in the header of a BMP file, which triggers a buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080142" comment="autotrace-0.31.1-635.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080145" comment="autotrace-devel-0.31.1-635.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080146" comment="libautotrace3-0.31.1-635.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079830" comment="libtiff-devel-32bit-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079831" comment="libtiff-devel-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079832" comment="libtiff5-32bit-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079833" comment="libtiff5-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079836" comment="tiff-4.0.2-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079830" comment="libtiff-devel-32bit-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079831" comment="libtiff-devel-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079832" comment="libtiff5-32bit-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079833" comment="libtiff5-4.0.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079836" comment="tiff-4.0.2-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1964</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964" source="CVE"/>
    <description>
    Xen 4.0.x and 4.1.x incorrectly releases a grant reference when releasing a non-v1, non-transitive grant, which allows local guest administrators to cause a denial of service (host crash), obtain sensitive information, or possible have other impacts via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1968</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1968" source="CVE"/>
    <description>
    Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080125" comment="libsvn_auth_gnome_keyring-1-0-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080127" comment="libsvn_auth_kwallet-1-0-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080129" comment="subversion-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080130" comment="subversion-bash-completion-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080133" comment="subversion-devel-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080134" comment="subversion-perl-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080136" comment="subversion-python-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080138" comment="subversion-server-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080140" comment="subversion-tools-1.7.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1969</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1969" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079674" comment="libxml2-2-2.7.8+git20120223-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079675" comment="libxml2-2-32bit-2.7.8+git20120223-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079678" comment="libxml2-2.7.8+git20120223-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079680" comment="libxml2-devel-2.7.8+git20120223-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079681" comment="libxml2-devel-32bit-2.7.8+git20120223-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079682" comment="libxml2-doc-2.7.8+git20120223-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079683" comment="libxml2-tools-2.7.8+git20120223-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079685" comment="python-libxml2-2.7.8+git20120223-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1976</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976" source="CVE"/>
    <description>
    The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090263" comment="tomcat-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090264" comment="tomcat-admin-webapps-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090265" comment="tomcat-docs-webapp-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090266" comment="tomcat-el-2_2-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090267" comment="tomcat-javadoc-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090268" comment="tomcat-jsp-2_2-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090269" comment="tomcat-jsvc-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090270" comment="tomcat-lib-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090271" comment="tomcat-servlet-3_0-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090272" comment="tomcat-webapps-7.0.27-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080236" comment="libX11-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080237" comment="libX11-6-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080238" comment="libX11-6-32bit-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080241" comment="libX11-data-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080243" comment="libX11-devel-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080244" comment="libX11-devel-32bit-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080245" comment="libX11-xcb1-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080246" comment="libX11-xcb1-32bit-1.5.0-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080072" comment="libXext-1.3.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080074" comment="libXext-devel-1.3.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080075" comment="libXext-devel-32bit-1.3.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080076" comment="libXext6-1.3.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080077" comment="libXext6-32bit-1.3.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080080" comment="libXfixes-5.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080082" comment="libXfixes-devel-32bit-5.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080083" comment="libXfixes-devel-5.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080084" comment="libXfixes3-32bit-5.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080085" comment="libXfixes3-5.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080164" comment="libXi-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080166" comment="libXi-devel-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080167" comment="libXi-devel-32bit-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080168" comment="libXi6-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080169" comment="libXi6-32bit-1.6.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080172" comment="libXinerama-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080174" comment="libXinerama-devel-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080175" comment="libXinerama-devel-32bit-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080176" comment="libXinerama1-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080177" comment="libXinerama1-32bit-1.1.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080180" comment="libXrandr-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080182" comment="libXrandr-devel-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080183" comment="libXrandr-devel-32bit-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080184" comment="libXrandr2-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080185" comment="libXrandr2-32bit-1.3.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080096" comment="libXrender-0.9.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080098" comment="libXrender-devel-0.9.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080099" comment="libXrender-devel-32bit-0.9.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080100" comment="libXrender1-0.9.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080101" comment="libXrender1-32bit-0.9.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080188" comment="libXRes1-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080189" comment="libXRes1-32bit-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080192" comment="libXres-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080194" comment="libXres-devel-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080195" comment="libXres-devel-32bit-1.0.6-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080112" comment="libXv-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080114" comment="libXv-devel-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080115" comment="libXv-devel-32bit-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080116" comment="libXv1-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080117" comment="libXv1-32bit-1.0.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080204" comment="libXvMC-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080206" comment="libXvMC-devel-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080207" comment="libXvMC-devel-32bit-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080208" comment="libXvMC1-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080209" comment="libXvMC1-32bit-1.0.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080212" comment="libXxf86dga-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080214" comment="libXxf86dga-devel-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080215" comment="libXxf86dga-devel-32bit-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080216" comment="libXxf86dga1-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080217" comment="libXxf86dga1-32bit-1.1.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080228" comment="libdmx-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080230" comment="libdmx-devel-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080231" comment="libdmx-devel-32bit-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080232" comment="libdmx1-1.1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080233" comment="libdmx1-32bit-1.1.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1993</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079580" comment="Mesa-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079581" comment="Mesa-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079585" comment="Mesa-devel-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079586" comment="Mesa-devel-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079587" comment="Mesa-libEGL-devel-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079588" comment="Mesa-libEGL-devel-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079589" comment="Mesa-libEGL1-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079590" comment="Mesa-libEGL1-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079593" comment="Mesa-libGL-devel-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079594" comment="Mesa-libGL-devel-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079595" comment="Mesa-libGL1-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079596" comment="Mesa-libGL1-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079599" comment="Mesa-libGLESv1_CM-devel-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079600" comment="Mesa-libGLESv1_CM-devel-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079601" comment="Mesa-libGLESv1_CM1-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079602" comment="Mesa-libGLESv1_CM1-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079605" comment="Mesa-libGLESv2-2-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079606" comment="Mesa-libGLESv2-2-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079609" comment="Mesa-libGLESv2-devel-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079610" comment="Mesa-libGLESv2-devel-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079611" comment="Mesa-libGLU-devel-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079612" comment="Mesa-libGLU-devel-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079613" comment="Mesa-libGLU1-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079614" comment="Mesa-libGLU1-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079617" comment="Mesa-libIndirectGL1-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079618" comment="Mesa-libIndirectGL1-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079621" comment="Mesa-libglapi0-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079622" comment="Mesa-libglapi0-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079625" comment="libOSMesa8-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079626" comment="libOSMesa8-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079629" comment="libXvMC_nouveau-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079630" comment="libXvMC_nouveau-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079633" comment="libXvMC_r300-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079634" comment="libXvMC_r300-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079637" comment="libXvMC_r600-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079638" comment="libXvMC_r600-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079641" comment="libXvMC_softpipe-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079642" comment="libXvMC_softpipe-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079645" comment="libgbm-devel-0.0.0-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079646" comment="libgbm-devel-32bit-0.0.0-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079647" comment="libgbm1-0.0.0-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079648" comment="libgbm1-32bit-0.0.0-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079651" comment="libvdpau_nouveau-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079652" comment="libvdpau_nouveau-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079655" comment="libvdpau_r300-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079656" comment="libvdpau_r300-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079659" comment="libvdpau_r600-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079660" comment="libvdpau_r600-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079663" comment="libvdpau_softpipe-32bit-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079664" comment="libvdpau_softpipe-8.0.4-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079667" comment="libxatracker-devel-1.0.0-20.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079668" comment="libxatracker1-1.0.0-20.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080164" comment="libXi-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080166" comment="libXi-devel-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080167" comment="libXi-devel-32bit-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080168" comment="libXi6-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080169" comment="libXi6-32bit-1.6.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1996</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" source="CVE"/>
    <description>
    X.org libFS 1.0.4 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080148" comment="libFS-1.0.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080150" comment="libFS-devel-1.0.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080151" comment="libFS-devel-32bit-1.0.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080152" comment="libFS6-1.0.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080153" comment="libFS6-32bit-1.0.4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080236" comment="libX11-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080237" comment="libX11-6-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080238" comment="libX11-6-32bit-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080241" comment="libX11-data-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080243" comment="libX11-devel-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080244" comment="libX11-devel-32bit-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080245" comment="libX11-xcb1-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080246" comment="libX11-xcb1-32bit-1.5.0-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080164" comment="libXi-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080166" comment="libXi-devel-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080167" comment="libXi-devel-32bit-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080168" comment="libXi6-1.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080169" comment="libXi6-32bit-1.6.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080204" comment="libXvMC-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080206" comment="libXvMC-devel-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080207" comment="libXvMC-devel-32bit-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080208" comment="libXvMC1-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080209" comment="libXvMC1-32bit-1.0.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080212" comment="libXxf86dga-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080214" comment="libXxf86dga-devel-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080215" comment="libXxf86dga-devel-32bit-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080216" comment="libXxf86dga1-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080217" comment="libXxf86dga1-32bit-1.1.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080220" comment="libXxf86vm-1.1.2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080222" comment="libXxf86vm-devel-1.1.2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080223" comment="libXxf86vm-devel-32bit-1.1.2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080224" comment="libXxf86vm1-1.1.2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080225" comment="libXxf86vm1-32bit-1.1.2-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080104" comment="libXt-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080106" comment="libXt-devel-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080107" comment="libXt-devel-32bit-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080108" comment="libXt6-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080109" comment="libXt6-32bit-1.1.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080156" comment="libXcursor-1.1.13-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080158" comment="libXcursor-devel-1.1.13-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080159" comment="libXcursor-devel-32bit-1.1.13-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080160" comment="libXcursor1-1.1.13-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080161" comment="libXcursor1-32bit-1.1.13-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080236" comment="libX11-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080237" comment="libX11-6-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080238" comment="libX11-6-32bit-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080241" comment="libX11-data-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080243" comment="libX11-devel-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080244" comment="libX11-devel-32bit-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080245" comment="libX11-xcb1-1.5.0-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080246" comment="libX11-xcb1-32bit-1.5.0-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080104" comment="libXt-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080106" comment="libXt-devel-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080107" comment="libXt-devel-32bit-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080108" comment="libXt6-1.1.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080109" comment="libXt6-32bit-1.1.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080462" comment="qemu-1.1.2-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080465" comment="qemu-guest-agent-1.1.2-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080467" comment="qemu-linux-user-1.1.2-3.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080468" comment="qemu-tools-1.1.2-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2020</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020" source="CVE"/>
    <description>
    Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079826" comment="clamav-0.97.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079827" comment="clamav-db-0.97.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2021</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021" source="CVE"/>
    <description>
    pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079826" comment="clamav-0.97.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079827" comment="clamav-db-0.97.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2061</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061" source="CVE"/>
    <description>
    The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091306" comment="openvpn-2.2.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091307" comment="openvpn-auth-pam-plugin-2.2.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091308" comment="openvpn-down-root-plugin-2.2.2-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080088" comment="libXp-1.0.1-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080090" comment="libXp-devel-1.0.1-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080091" comment="libXp-devel-32bit-1.0.1-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080092" comment="libXp6-1.0.1-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080093" comment="libXp6-32bit-1.0.1-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080196" comment="libXtst-1.2.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080198" comment="libXtst-devel-1.2.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080199" comment="libXtst-devel-32bit-1.2.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080200" comment="libXtst6-1.2.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080201" comment="libXtst6-32bit-1.2.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079980" comment="libxcb-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079981" comment="libxcb-composite0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079982" comment="libxcb-composite0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079985" comment="libxcb-damage0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079986" comment="libxcb-damage0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079990" comment="libxcb-devel-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079991" comment="libxcb-devel-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079992" comment="libxcb-dpms0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079993" comment="libxcb-dpms0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079996" comment="libxcb-dri2-0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079997" comment="libxcb-dri2-0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080000" comment="libxcb-glx0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080001" comment="libxcb-glx0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080004" comment="libxcb-randr0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080005" comment="libxcb-randr0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080008" comment="libxcb-record0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080009" comment="libxcb-record0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080012" comment="libxcb-render0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080013" comment="libxcb-render0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080016" comment="libxcb-res0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080017" comment="libxcb-res0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080020" comment="libxcb-screensaver0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080021" comment="libxcb-screensaver0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080024" comment="libxcb-shape0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080025" comment="libxcb-shape0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080028" comment="libxcb-shm0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080029" comment="libxcb-shm0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080032" comment="libxcb-sync0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080033" comment="libxcb-sync0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080036" comment="libxcb-xevie0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080037" comment="libxcb-xevie0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080040" comment="libxcb-xf86dri0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080041" comment="libxcb-xf86dri0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080044" comment="libxcb-xfixes0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080045" comment="libxcb-xfixes0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080048" comment="libxcb-xinerama0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080049" comment="libxcb-xinerama0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080052" comment="libxcb-xprint0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080053" comment="libxcb-xprint0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080056" comment="libxcb-xtest0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080057" comment="libxcb-xtest0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080060" comment="libxcb-xv0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080061" comment="libxcb-xv0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080064" comment="libxcb-xvmc0-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080065" comment="libxcb-xvmc0-32bit-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080068" comment="libxcb1-1.8.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080069" comment="libxcb1-32bit-1.8.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2065</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2065" source="CVE"/>
    <description>
    (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091125" comment="ruby19-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091126" comment="ruby19-devel-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091127" comment="ruby19-devel-extra-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091128" comment="ruby19-doc-ri-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091129" comment="ruby19-tk-1.9.3.p392-3.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080112" comment="libXv-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080114" comment="libXv-devel-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080115" comment="libXv-devel-32bit-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080116" comment="libXv1-1.0.7-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080117" comment="libXv1-32bit-1.0.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2067</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2067" source="CVE"/>
    <description>
    java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090263" comment="tomcat-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090264" comment="tomcat-admin-webapps-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090265" comment="tomcat-docs-webapp-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090266" comment="tomcat-el-2_2-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090267" comment="tomcat-javadoc-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090268" comment="tomcat-jsp-2_2-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090269" comment="tomcat-jsvc-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090270" comment="tomcat-lib-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090271" comment="tomcat-servlet-3_0-api-7.0.27-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090272" comment="tomcat-webapps-7.0.27-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2072</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072" source="CVE"/>
    <description>
    Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2076</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" source="CVE"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x, when running on AMD64 processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one domain to determine portions of the state of floating point instructions of other domains, which can be leveraged to obtain sensitive information such as cryptographic keys, a similar vulnerability to CVE-2006-1056.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2077</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" source="CVE"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x does not properly restrict the contents of a XRSTOR, which allows local PV guest users to cause a denial of service (unhandled exception and hypervisor crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2078</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" source="CVE"/>
    <description>
    Xen 4.0.2 through 4.0.4, 4.1.x, and 4.2.x allows local PV guest users to cause a denial of service (hypervisor crash) via certain bit combinations to the XSETBV instruction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2088</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2088" source="CVE"/>
    <description>
    contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080125" comment="libsvn_auth_gnome_keyring-1-0-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080127" comment="libsvn_auth_kwallet-1-0-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080129" comment="subversion-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080130" comment="subversion-bash-completion-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080133" comment="subversion-devel-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080134" comment="subversion-perl-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080136" comment="subversion-python-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080138" comment="subversion-server-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080140" comment="subversion-tools-1.7.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2094</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094" source="CVE"/>
    <description>
    The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079912" comment="kernel-debug-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079913" comment="kernel-debug-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079917" comment="kernel-debug-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079919" comment="kernel-default-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079920" comment="kernel-default-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079924" comment="kernel-default-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079926" comment="kernel-desktop-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079927" comment="kernel-desktop-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079931" comment="kernel-desktop-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079933" comment="kernel-docs-3.4.47-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079934" comment="kernel-ec2-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079935" comment="kernel-ec2-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079939" comment="kernel-ec2-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079941" comment="kernel-ec2-extra-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079943" comment="kernel-pae-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079944" comment="kernel-pae-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079948" comment="kernel-pae-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079950" comment="kernel-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079951" comment="kernel-source-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079952" comment="kernel-source-vanilla-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079953" comment="kernel-syms-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079954" comment="kernel-trace-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079955" comment="kernel-trace-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079959" comment="kernel-trace-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079961" comment="kernel-vanilla-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079964" comment="kernel-vanilla-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079966" comment="kernel-xen-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079967" comment="kernel-xen-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079971" comment="kernel-xen-devel-3.4.47-2.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2112</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2112" source="CVE"/>
    <description>
    The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080125" comment="libsvn_auth_gnome_keyring-1-0-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080127" comment="libsvn_auth_kwallet-1-0-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080129" comment="subversion-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080130" comment="subversion-bash-completion-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080133" comment="subversion-devel-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080134" comment="subversion-perl-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080136" comment="subversion-python-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080138" comment="subversion-server-1.7.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080140" comment="subversion-tools-1.7.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2117</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2117" source="CVE"/>
    <description>
    Directory traversal vulnerability in the cgit_parse_readme function in ui-summary.c in cgit before 0.9.2, when a readme file is set to a filesystem path, allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080473" comment="cgit-0.9.0.2-14.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2126</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2126" source="CVE"/>
    <description>
    Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080249" comment="darktable-1.0.5-3.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080349" comment="libkdcraw-4.8.5-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080351" comment="libkdcraw-devel-4.8.5-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080352" comment="libkdcraw20-4.8.5-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2145</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2145" source="CVE"/>
    <description>
    The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080362" comment="perl-Module-Signature-0.73-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2148</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2148" source="CVE"/>
    <description>
    The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2164</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164" source="CVE"/>
    <description>
    The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080284" comment="curl-7.25.0-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080287" comment="libcurl-devel-7.25.0-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080288" comment="libcurl4-32bit-7.25.0-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080289" comment="libcurl4-7.25.0-2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2178</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2178" source="CVE"/>
    <description>
    The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080263" comment="fail2ban-0.8.6-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2186</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186" source="CVE"/>
    <description>
    The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091108" comment="jakarta-commons-fileupload-1.1.1-112.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091109" comment="jakarta-commons-fileupload-javadoc-1.1.1-112.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2190</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2190" source="CVE"/>
    <description>
    The translate_hierarchy_event function in x11/clutter-device-manager-xi2.c in Clutter, when resuming the system, does not properly handle XIQueryDevice errors when a device has "disappeared," which causes the gnome-shell to crash and allows physically proximate attackers to access the previous gnome-shell session via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090972" comment="clutter-1.10.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090973" comment="clutter-devel-1.10.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090974" comment="clutter-lang-1.10.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090975" comment="libclutter-1_0-0-1.10.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090976" comment="libclutter-1_0-0-32bit-1.10.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090977" comment="typelib-1_0-Clutter-1_0-1.10.6-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2191</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2191" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080330" comment="python-bugzilla-0.6.2-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2211</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" source="CVE"/>
    <description>
    The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090332" comment="xen-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090334" comment="xen-devel-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090335" comment="xen-kmp-default-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090337" comment="xen-kmp-desktop-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090339" comment="xen-kmp-pae-4.1.5_04_k3.4.47_2.38-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090341" comment="xen-libs-32bit-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090342" comment="xen-libs-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090345" comment="xen-tools-domU-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090347" comment="xen-doc-html-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090348" comment="xen-doc-pdf-4.1.5_04-5.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090349" comment="xen-tools-4.1.5_04-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2214</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2214" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080331" comment="nagios-3.5.0-2.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080334" comment="nagios-devel-3.5.0-2.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080335" comment="nagios-www-3.5.0-2.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080336" comment="nagios-www-dch-3.5.0-2.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2217</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2217" source="CVE"/>
    <description>
    cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080461" comment="python-suds-0.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2221</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2221" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ZRtp::storeMsgTemp function in GNU ZRTPCPP before 3.2.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091119" comment="libzrtpcpp-2.0.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091120" comment="libzrtpcpp-devel-2.0.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091121" comment="libzrtpcpp2-2.0.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2222</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2222" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in GNU ZRTPCPP before 3.2.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ZRTP Hello packet to the (1) ZRtp::findBestSASType, (2) ZRtp::findBestAuthLen, (3) ZRtp::findBestCipher, (4) ZRtp::findBestHash, or (5) ZRtp::findBestPubKey functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091119" comment="libzrtpcpp-2.0.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091120" comment="libzrtpcpp-devel-2.0.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091121" comment="libzrtpcpp2-2.0.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2223</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2223" source="CVE"/>
    <description>
    GNU ZRTPCPP before 3.2.0 allows remote attackers to obtain sensitive information (uninitialized heap memory) or cause a denial of service (out-of-bounds read) via a crafted packet, as demonstrated by a truncated Ping packet that is not properly handled by the getEpHash function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091119" comment="libzrtpcpp-2.0.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091120" comment="libzrtpcpp-devel-2.0.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091121" comment="libzrtpcpp2-2.0.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2232</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232" source="CVE"/>
    <description>
    The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2234</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234" source="CVE"/>
    <description>
    The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2237</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237" source="CVE"/>
    <description>
    The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079390" comment="bind-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079391" comment="bind-chrootenv-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079394" comment="bind-devel-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079395" comment="bind-doc-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079396" comment="bind-libs-32bit-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079397" comment="bind-libs-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079400" comment="bind-lwresd-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079402" comment="bind-utils-9.9.2P2-1.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079404" comment="dhcp-4.2.4.P2-0.1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079405" comment="dhcp-client-4.2.4.P2-0.1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079409" comment="dhcp-devel-4.2.4.P2-0.1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079410" comment="dhcp-doc-4.2.4.P2-0.1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079411" comment="dhcp-relay-4.2.4.P2-0.1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079413" comment="dhcp-server-4.2.4.P2-0.1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2274</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2274" source="CVE"/>
    <description>
    Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2275</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2275" source="CVE"/>
    <description>
    The default configuration for puppet masters 0.25.0 and later in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, allows remote authenticated nodes to submit reports for other nodes via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079388" comment="puppet-2.7.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079389" comment="puppet-server-2.7.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2415</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2415" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows local users to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "processing of MTOM attachments" and the creation of temporary files with weak permissions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2421</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2421" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect MethodHandle lookups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2423</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2423" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2426</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect invocation of the defaultReadObject method in the ConcurrentHashMap class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2431</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2431" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to bypassing the Java sandbox using "method handle intrinsic frames."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2436</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2436" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-1488 and CVE-2013-2426.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "type checks" and "method handle binding" involving Wrapper.convert.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079708" comment="java-1_7_0-openjdk-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079711" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079713" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079715" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079716" comment="java-1_7_0-openjdk-src-1.7.0.6-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2445</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2449</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to GnomeFileTypeDetector and a missing check for read permissions for a path.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2458</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2460</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2461</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a "Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080477" comment="java-1_7_0-openjdk-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080480" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080482" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080484" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080485" comment="java-1_7_0-openjdk-src-1.7.0.6-3.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079908" comment="wireshark-1.8.7-1.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079911" comment="wireshark-devel-1.8.7-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079908" comment="wireshark-1.8.7-1.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079911" comment="wireshark-devel-1.8.7-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079178" comment="wireshark-1.8.6-1.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079181" comment="wireshark-devel-1.8.6-1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2492</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2492" source="CVE"/>
    <description>
    Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079158" comment="firebird-classic-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079161" comment="libfbembed-devel-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079162" comment="libfbembed2_5-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079164" comment="firebird-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079165" comment="firebird-32bit-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079169" comment="firebird-devel-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079170" comment="firebird-doc-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079171" comment="firebird-superserver-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079173" comment="libfbclient2-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079174" comment="libfbclient2-32bit-2.5.2.26539-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079177" comment="libfbclient2-devel-2.5.2.26539-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2503</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2503" source="CVE"/>
    <description>
    Privoxy before 3.0.21 does not properly handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream, which makes it easier for remote HTTP servers to spoof the intended proxy service via a 407 (aka Proxy Authentication Required) HTTP status code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079318" comment="privoxy-3.0.21-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079321" comment="privoxy-doc-3.0.21-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2625</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2625" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089864" comment="otrs-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089865" comment="otrs-doc-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089866" comment="otrs-itsm-3.1.10-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2637</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2637" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089864" comment="otrs-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089865" comment="otrs-doc-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089866" comment="otrs-itsm-3.1.10-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2765</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765" source="CVE"/>
    <description>
    The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089867" comment="apache2-mod_security2-2.7.5-14.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2838</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2838" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080338" comment="chromedriver-30.0.1553.0-1.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080340" comment="chromium-30.0.1553.0-1.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080343" comment="chromium-desktop-gnome-30.0.1553.0-1.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080344" comment="chromium-desktop-kde-30.0.1553.0-1.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080345" comment="chromium-ffmpegsumo-30.0.1553.0-1.42.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080347" comment="chromium-suid-helper-30.0.1553.0-1.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079912" comment="kernel-debug-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079913" comment="kernel-debug-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079917" comment="kernel-debug-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079919" comment="kernel-default-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079920" comment="kernel-default-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079924" comment="kernel-default-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079926" comment="kernel-desktop-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079927" comment="kernel-desktop-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079931" comment="kernel-desktop-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079933" comment="kernel-docs-3.4.47-2.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079934" comment="kernel-ec2-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079935" comment="kernel-ec2-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079939" comment="kernel-ec2-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079941" comment="kernel-ec2-extra-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079943" comment="kernel-pae-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079944" comment="kernel-pae-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079948" comment="kernel-pae-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079950" comment="kernel-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079951" comment="kernel-source-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079952" comment="kernel-source-vanilla-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079953" comment="kernel-syms-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079954" comment="kernel-trace-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079955" comment="kernel-trace-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079959" comment="kernel-trace-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079961" comment="kernel-vanilla-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079964" comment="kernel-vanilla-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079966" comment="kernel-xen-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079967" comment="kernel-xen-base-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079971" comment="kernel-xen-devel-3.4.47-2.38.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2851</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851" source="CVE"/>
    <description>
    Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2877</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080486" comment="libxml2-2-2.7.8+git20120223-8.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080487" comment="libxml2-2-32bit-2.7.8+git20120223-8.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080490" comment="libxml2-2.7.8+git20120223-8.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080492" comment="libxml2-devel-2.7.8+git20120223-8.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080493" comment="libxml2-devel-32bit-2.7.8+git20120223-8.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080494" comment="libxml2-doc-2.7.8+git20120223-8.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080495" comment="libxml2-tools-2.7.8+git20120223-8.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080497" comment="python-libxml2-2.7.8+git20120223-8.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2906</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2906" source="CVE"/>
    <description>
    Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2907</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2907" source="CVE"/>
    <description>
    The Window.prototype object implementation in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2908</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2908" source="CVE"/>
    <description>
    Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2909</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909" source="CVE"/>
    <description>
    Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2910</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2910" source="CVE"/>
    <description>
    Use-after-free vulnerability in modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2911</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2911" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recompilation in unspecified libxslt versions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2912</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2912" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PepperInProcessRouter::SendToHost function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a resource-destruction message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2913</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2913" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2914</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2914" source="CVE"/>
    <description>
    Use-after-free vulnerability in the color-chooser dialog in Google Chrome before 30.0.1599.66 on Windows allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to color_chooser_dialog.cc and color_chooser_win.cc in browser/ui/views/.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2915</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2915" source="CVE"/>
    <description>
    Google Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in certain invalid circumstances, which allows remote attackers to spoof the address bar via a URL with a malformed scheme, as demonstrated by a nonexistent:12121 URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2916</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2916" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2917</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2917" source="CVE"/>
    <description>
    The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2918</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2918" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RenderBlock::collapseAnonymousBlockChild function in core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect handling of parent-child relationships for anonymous blocks.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2919</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2919" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2920</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2920" source="CVE"/>
    <description>
    The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2921</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2921" source="CVE"/>
    <description>
    Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2922</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2922" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that operates on a TEMPLATE element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2923</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2923" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2924</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2924" source="CVE"/>
    <description>
    Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091051" comment="chromedriver-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091052" comment="chromium-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091053" comment="chromium-desktop-gnome-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091054" comment="chromium-desktop-kde-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091055" comment="chromium-ffmpegsumo-30.0.1599.66-1.46.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091056" comment="chromium-suid-helper-30.0.1599.66-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2925</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2925" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091444" comment="chromedriver-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091445" comment="chromium-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091446" comment="chromium-desktop-gnome-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091447" comment="chromium-desktop-kde-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091448" comment="chromium-ffmpegsumo-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091449" comment="chromium-suid-helper-30.0.1599.114-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2926</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2926" source="CVE"/>
    <description>
    Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091444" comment="chromedriver-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091445" comment="chromium-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091446" comment="chromium-desktop-gnome-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091447" comment="chromium-desktop-kde-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091448" comment="chromium-ffmpegsumo-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091449" comment="chromium-suid-helper-30.0.1599.114-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2927</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2927" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091444" comment="chromedriver-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091445" comment="chromium-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091446" comment="chromium-desktop-gnome-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091447" comment="chromium-desktop-kde-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091448" comment="chromium-ffmpegsumo-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091449" comment="chromium-suid-helper-30.0.1599.114-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2928</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2928" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091444" comment="chromedriver-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091445" comment="chromium-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091446" comment="chromium-desktop-gnome-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091447" comment="chromium-desktop-kde-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091448" comment="chromium-ffmpegsumo-30.0.1599.114-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091449" comment="chromium-suid-helper-30.0.1599.114-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2931</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2944</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2944" source="CVE"/>
    <description>
    strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079786" comment="strongswan-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079788" comment="strongswan-doc-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079789" comment="strongswan-ikev1-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079791" comment="strongswan-ikev2-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079793" comment="strongswan-ipsec-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079795" comment="strongswan-libs0-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079797" comment="strongswan-mysql-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079799" comment="strongswan-nm-4.6.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079801" comment="strongswan-sqlite-4.6.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3238</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3238" source="CVE"/>
    <description>
    phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3 allows remote authenticated users to execute arbitrary code via a /e\x00 sequence, which is not properly handled before making a preg_replace function call within the "Replace table prefix" feature.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080256" comment="phpMyAdmin-3.5.8.1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3239</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239" source="CVE"/>
    <description>
    phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080256" comment="phpMyAdmin-3.5.8.1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3551</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3551" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089864" comment="otrs-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089865" comment="otrs-doc-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089866" comment="otrs-itsm-3.1.10-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080252" comment="wireshark-1.8.8-1.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080255" comment="wireshark-devel-1.8.8-1.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3704</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3704" source="CVE"/>
    <description>
    The RPM GPG key import and handling feature in libzypp 12.15.0 and earlier reports a different key fingerprint than the one used to sign a repository when multiple key blobs are used, which might allow remote attackers to trick users into believing that the repository was signed by a more-trustworthy key.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090386" comment="libzypp-11.13.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090389" comment="libzypp-devel-11.13.0-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3709</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3709" source="CVE"/>
    <description>
    WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092298" comment="webyast-base-0.3.19.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092299" comment="webyast-base-branding-default-0.3.19.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092300" comment="webyast-base-testsuite-0.3.19.1-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect availability via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4073</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073" source="CVE"/>
    <description>
    The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080354" comment="ruby19-1.9.3.p392-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080357" comment="ruby19-devel-1.9.3.p392-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080358" comment="ruby19-devel-extra-1.9.3.p392-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080359" comment="ruby19-doc-ri-1.9.3.p392-3.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080360" comment="ruby19-tk-1.9.3.p392-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4088</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4088" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089864" comment="otrs-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089865" comment="otrs-doc-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089866" comment="otrs-itsm-3.1.10-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4113</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113" source="CVE"/>
    <description>
    ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080501" comment="apache2-mod_php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080503" comment="php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080504" comment="php5-bcmath-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080506" comment="php5-bz2-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080508" comment="php5-calendar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080510" comment="php5-ctype-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080512" comment="php5-curl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080514" comment="php5-dba-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080518" comment="php5-devel-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080519" comment="php5-dom-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080521" comment="php5-enchant-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080523" comment="php5-exif-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080525" comment="php5-fastcgi-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080527" comment="php5-fileinfo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080529" comment="php5-fpm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080531" comment="php5-ftp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080533" comment="php5-gd-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080535" comment="php5-gettext-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080537" comment="php5-gmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080539" comment="php5-iconv-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080541" comment="php5-imap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080543" comment="php5-intl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080545" comment="php5-json-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080547" comment="php5-ldap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080549" comment="php5-mbstring-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080551" comment="php5-mcrypt-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080553" comment="php5-mssql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080555" comment="php5-mysql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080557" comment="php5-odbc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080559" comment="php5-openssl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080561" comment="php5-pcntl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080563" comment="php5-pdo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080565" comment="php5-pear-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080566" comment="php5-pgsql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080568" comment="php5-phar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080570" comment="php5-posix-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080572" comment="php5-pspell-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080574" comment="php5-readline-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080576" comment="php5-shmop-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080578" comment="php5-snmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080580" comment="php5-soap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080582" comment="php5-sockets-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080584" comment="php5-sqlite-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080586" comment="php5-suhosin-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080588" comment="php5-sysvmsg-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080590" comment="php5-sysvsem-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080592" comment="php5-sysvshm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080594" comment="php5-tidy-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080596" comment="php5-tokenizer-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080598" comment="php5-wddx-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080600" comment="php5-xmlreader-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080602" comment="php5-xmlrpc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080604" comment="php5-xmlwriter-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080606" comment="php5-xsl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080608" comment="php5-zip-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080610" comment="php5-zlib-5.3.15-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4114</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4114" source="CVE"/>
    <description>
    The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080500" comment="nagstamon-0.9.10-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4115</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115" source="CVE"/>
    <description>
    Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090449" comment="squid-2.7.STABLE9-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090452" comment="squid3-3.1.23-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089931" comment="samba-doc-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089932" comment="libnetapi-devel-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089933" comment="libnetapi0-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089935" comment="libsmbclient-devel-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089936" comment="libsmbclient0-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089937" comment="libsmbclient0-32bit-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089940" comment="libsmbsharemodes-devel-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089941" comment="libsmbsharemodes0-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089943" comment="libwbclient-devel-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089944" comment="libwbclient0-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089945" comment="libwbclient0-32bit-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089948" comment="samba-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089949" comment="samba-32bit-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089950" comment="samba-client-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089951" comment="samba-client-32bit-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089957" comment="samba-devel-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089958" comment="samba-krb-printing-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089960" comment="samba-winbind-3.6.7-48.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089961" comment="samba-winbind-32bit-3.6.7-48.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4131</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4131" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080622" comment="libsvn_auth_gnome_keyring-1-0-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080624" comment="libsvn_auth_kwallet-1-0-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080626" comment="subversion-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080627" comment="subversion-bash-completion-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080630" comment="subversion-devel-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080631" comment="subversion-perl-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080633" comment="subversion-python-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080635" comment="subversion-server-1.7.11-4.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080637" comment="subversion-tools-1.7.11-4.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4132</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132" source="CVE"/>
    <description>
    KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080639" comment="kde4-kgreeter-plugins-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080641" comment="kdebase4-workspace-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080642" comment="kdebase4-workspace-branding-upstream-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080645" comment="kdebase4-workspace-devel-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080647" comment="kdebase4-workspace-ksysguardd-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080649" comment="kdebase4-workspace-liboxygenstyle-32bit-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080650" comment="kdebase4-workspace-liboxygenstyle-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080653" comment="kdebase4-workspace-plasma-calendar-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080655" comment="kdebase4-workspace-plasma-engine-akonadi-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080657" comment="kdm-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080658" comment="kdm-branding-upstream-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080660" comment="kwin-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080662" comment="python-kdebase4-4.8.5-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4133</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080639" comment="kde4-kgreeter-plugins-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080641" comment="kdebase4-workspace-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080642" comment="kdebase4-workspace-branding-upstream-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080645" comment="kdebase4-workspace-devel-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080647" comment="kdebase4-workspace-ksysguardd-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080649" comment="kdebase4-workspace-liboxygenstyle-32bit-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080650" comment="kdebase4-workspace-liboxygenstyle-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080653" comment="kdebase4-workspace-plasma-calendar-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080655" comment="kdebase4-workspace-plasma-engine-akonadi-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080657" comment="kdm-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080658" comment="kdm-branding-upstream-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080660" comment="kwin-4.8.5-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080662" comment="python-kdebase4-4.8.5-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4162</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162" source="CVE"/>
    <description>
    The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4163</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4163" source="CVE"/>
    <description>
    The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091167" comment="kernel-debug-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091168" comment="kernel-debug-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091169" comment="kernel-debug-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091170" comment="kernel-default-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091171" comment="kernel-default-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091172" comment="kernel-default-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091173" comment="kernel-desktop-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091174" comment="kernel-desktop-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091175" comment="kernel-desktop-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091176" comment="kernel-docs-3.4.63-2.44.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091177" comment="kernel-ec2-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091178" comment="kernel-ec2-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091179" comment="kernel-ec2-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091180" comment="kernel-ec2-extra-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091181" comment="kernel-pae-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091182" comment="kernel-pae-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091183" comment="kernel-pae-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091184" comment="kernel-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091185" comment="kernel-source-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091186" comment="kernel-source-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091187" comment="kernel-syms-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091188" comment="kernel-trace-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091189" comment="kernel-trace-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091190" comment="kernel-trace-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091191" comment="kernel-vanilla-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091192" comment="kernel-vanilla-devel-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091193" comment="kernel-xen-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091194" comment="kernel-xen-base-3.4.63-2.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091195" comment="kernel-xen-devel-3.4.63-2.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4164</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164" source="CVE"/>
    <description>
    Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091808" comment="ruby19-1.9.3.p392-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091809" comment="ruby19-devel-1.9.3.p392-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091810" comment="ruby19-devel-extra-1.9.3.p392-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091811" comment="ruby19-doc-ri-1.9.3.p392-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091812" comment="ruby19-tk-1.9.3.p392-3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4206</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4206" source="CVE"/>
    <description>
    Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090117" comment="filezilla-3.7.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090120" comment="filezilla-lang-3.7.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4207</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4207" source="CVE"/>
    <description>
    Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090117" comment="filezilla-3.7.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090120" comment="filezilla-lang-3.7.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4208</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4208" source="CVE"/>
    <description>
    The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090117" comment="filezilla-3.7.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090120" comment="filezilla-lang-3.7.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090694" comment="libtiff-devel-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090695" comment="libtiff-devel-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090696" comment="libtiff5-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090697" comment="libtiff5-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090700" comment="tiff-4.0.2-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted TIFF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090694" comment="libtiff-devel-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090695" comment="libtiff-devel-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090696" comment="libtiff5-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090697" comment="libtiff5-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090700" comment="tiff-4.0.2-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4233</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233" source="CVE"/>
    <description>
    Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091216" comment="libmodplug-0.8.8.4-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091217" comment="libmodplug-devel-0.8.8.4-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091218" comment="libmodplug1-0.8.8.4-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091219" comment="libmodplug1-32bit-0.8.8.4-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4234</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091216" comment="libmodplug-0.8.8.4-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091217" comment="libmodplug-devel-0.8.8.4-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091218" comment="libmodplug1-0.8.8.4-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091219" comment="libmodplug1-32bit-0.8.8.4-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090394" comment="libpython2_7-1_0-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090395" comment="libpython2_7-1_0-32bit-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090398" comment="python-base-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090399" comment="python-base-32bit-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090403" comment="python-devel-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090404" comment="python-xml-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090406" comment="python-doc-2.7-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090407" comment="python-doc-pdf-2.7-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090408" comment="python-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090409" comment="python-32bit-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090410" comment="python-curses-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090415" comment="python-demo-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090416" comment="python-gdbm-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090418" comment="python-idle-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090419" comment="python-tk-2.7.3-3.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090421" comment="libpython3_2mu1_0-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090422" comment="libpython3_2mu1_0-32bit-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090425" comment="python3-2to3-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090426" comment="python3-base-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090429" comment="python3-devel-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090430" comment="python3-idle-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090431" comment="python3-testsuite-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090433" comment="python3-tools-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090434" comment="python3-xml-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090436" comment="python3-doc-3.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090437" comment="python3-doc-pdf-3.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090438" comment="python3-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090439" comment="python3-32bit-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090440" comment="python3-curses-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090442" comment="python3-dbm-3.2.3-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090447" comment="python3-tk-3.2.3-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090694" comment="libtiff-devel-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090695" comment="libtiff-devel-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090696" comment="libtiff5-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090697" comment="libtiff5-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090700" comment="tiff-4.0.2-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090694" comment="libtiff-devel-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090695" comment="libtiff-devel-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090696" comment="libtiff5-32bit-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090697" comment="libtiff5-4.0.2-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090700" comment="tiff-4.0.2-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4248</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248" source="CVE"/>
    <description>
    The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092301" comment="apache2-mod_php5-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092302" comment="php5-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092303" comment="php5-bcmath-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092304" comment="php5-bz2-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092305" comment="php5-calendar-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092306" comment="php5-ctype-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092307" comment="php5-curl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092308" comment="php5-dba-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092309" comment="php5-devel-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092310" comment="php5-dom-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092311" comment="php5-enchant-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092312" comment="php5-exif-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092313" comment="php5-fastcgi-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092314" comment="php5-fileinfo-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092315" comment="php5-fpm-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092316" comment="php5-ftp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092317" comment="php5-gd-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092318" comment="php5-gettext-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092319" comment="php5-gmp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092320" comment="php5-iconv-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092321" comment="php5-imap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092322" comment="php5-intl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092323" comment="php5-json-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092324" comment="php5-ldap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092325" comment="php5-mbstring-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092326" comment="php5-mcrypt-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092327" comment="php5-mssql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092328" comment="php5-mysql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092329" comment="php5-odbc-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092330" comment="php5-openssl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092331" comment="php5-pcntl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092332" comment="php5-pdo-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092333" comment="php5-pear-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092334" comment="php5-pgsql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092335" comment="php5-phar-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092336" comment="php5-posix-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092337" comment="php5-pspell-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092338" comment="php5-readline-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092339" comment="php5-shmop-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092340" comment="php5-snmp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092341" comment="php5-soap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092342" comment="php5-sockets-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092343" comment="php5-sqlite-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092344" comment="php5-suhosin-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092345" comment="php5-sysvmsg-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092346" comment="php5-sysvsem-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092347" comment="php5-sysvshm-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092348" comment="php5-tidy-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092349" comment="php5-tokenizer-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092350" comment="php5-wddx-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092351" comment="php5-xmlreader-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092352" comment="php5-xmlrpc-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092353" comment="php5-xmlwriter-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092354" comment="php5-xsl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092355" comment="php5-zip-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092356" comment="php5-zlib-5.3.15-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091007" comment="lcms-1.19-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091008" comment="liblcms-devel-1.19-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091009" comment="liblcms-devel-32bit-1.19-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091010" comment="liblcms1-1.19-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091011" comment="liblcms1-32bit-1.19-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091012" comment="python-lcms-1.19-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4277</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277" source="CVE"/>
    <description>
    Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090455" comment="libsvn_auth_gnome_keyring-1-0-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090457" comment="libsvn_auth_kwallet-1-0-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090459" comment="subversion-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090460" comment="subversion-bash-completion-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090463" comment="subversion-devel-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090464" comment="subversion-perl-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090466" comment="subversion-python-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090468" comment="subversion-server-1.7.13-4.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090470" comment="subversion-tools-1.7.13-4.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4287</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091125" comment="ruby19-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091126" comment="ruby19-devel-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091127" comment="ruby19-devel-extra-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091128" comment="ruby19-doc-ri-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091129" comment="ruby19-tk-1.9.3.p392-3.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4288</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288" source="CVE"/>
    <description>
    Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090924" comment="systemd-gtk-44-10.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090925" comment="systemd-32bit-44-10.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090926" comment="systemd-44-10.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090927" comment="systemd-analyze-44-10.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090928" comment="systemd-devel-44-10.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090929" comment="systemd-sysvinit-44-10.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091144" comment="hplip-3.12.4-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091145" comment="hplip-hpijs-3.12.4-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091146" comment="hplip-sane-3.12.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091024" comment="libvirt-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091025" comment="libvirt-client-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091026" comment="libvirt-client-32bit-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091027" comment="libvirt-devel-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091028" comment="libvirt-devel-32bit-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091029" comment="libvirt-doc-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091030" comment="libvirt-lock-sanlock-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091031" comment="libvirt-python-0.9.11.9-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4311</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311" source="CVE"/>
    <description>
    libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091024" comment="libvirt-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091025" comment="libvirt-client-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091026" comment="libvirt-client-32bit-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091027" comment="libvirt-devel-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091028" comment="libvirt-devel-32bit-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091029" comment="libvirt-doc-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091030" comment="libvirt-lock-sanlock-0.9.11.9-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091031" comment="libvirt-python-0.9.11.9-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4314</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314" source="CVE"/>
    <description>
    The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091304" comment="python-pyOpenSSL-doc-0.12-7.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091305" comment="python-pyOpenSSL-0.12-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4324</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4324" source="CVE"/>
    <description>
    spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091077" comment="libspice-client-glib-2_0-1-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091078" comment="libspice-client-gtk-2_0-1-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091079" comment="libspice-client-gtk-3_0-1-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091080" comment="libspice-controller0-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091081" comment="python-SpiceClientGtk-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091082" comment="spice-gtk-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091083" comment="spice-gtk-devel-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091084" comment="spice-gtk-lang-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091085" comment="typelib-1_0-SpiceClientGlib-2_0-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091086" comment="typelib-1_0-SpiceClientGtk-2_0-0.12-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091087" comment="typelib-1_0-SpiceClientGtk-3_0-0.12-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091144" comment="hplip-3.12.4-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091145" comment="hplip-hpijs-3.12.4-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091146" comment="hplip-sane-3.12.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4326</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4326" source="CVE"/>
    <description>
    RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091006" comment="rtkit-0.10_git201107141740-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4349</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4540.  Reason: This candidate was MERGED into CVE-2012-4540, since it was later discovered that it affected an additional version, but it does not constitute a regression error.  Notes: All CVE users should reference CVE-2012-4540 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090792" comment="icedtea-web-1.4.1-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090795" comment="icedtea-web-javadoc-1.4.1-1.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090719" comment="gpg2-2.0.19-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090722" comment="gpg2-lang-2.0.19-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090922" comment="gpg2-2.0.19-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090923" comment="gpg2-lang-2.0.19-2.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4353</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" source="CVE"/>
    <description>
    The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093003" comment="libopenssl-devel-1.0.1e-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093004" comment="libopenssl-devel-32bit-1.0.1e-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093005" comment="libopenssl1_0_0-1.0.1e-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093006" comment="libopenssl1_0_0-32bit-1.0.1e-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093007" comment="openssl-1.0.1e-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093008" comment="openssl-doc-1.0.1e-2.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091220" comment="xen-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091221" comment="xen-devel-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091222" comment="xen-kmp-default-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091223" comment="xen-kmp-desktop-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091224" comment="xen-kmp-pae-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091225" comment="xen-libs-32bit-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091226" comment="xen-libs-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091227" comment="xen-tools-domU-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091228" comment="xen-doc-html-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091229" comment="xen-doc-pdf-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091230" comment="xen-tools-4.1.6_01-5.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4359</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4359" source="CVE"/>
    <description>
    Integer overflow in kbdint.c in mod_sftp in ProFTPD 1.3.4d and 1.3.5r3 allows remote attackers to cause a denial of service (memory consumption) via a large response count value in an authentication request, which triggers a large memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091068" comment="proftpd-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091069" comment="proftpd-devel-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091070" comment="proftpd-doc-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091071" comment="proftpd-lang-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091072" comment="proftpd-ldap-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091073" comment="proftpd-mysql-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091074" comment="proftpd-pgsql-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091075" comment="proftpd-radius-1.3.4d-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091076" comment="proftpd-sqlite-1.3.4d-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091220" comment="xen-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091221" comment="xen-devel-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091222" comment="xen-kmp-default-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091223" comment="xen-kmp-desktop-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091224" comment="xen-kmp-pae-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091225" comment="xen-libs-32bit-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091226" comment="xen-libs-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091227" comment="xen-tools-domU-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091228" comment="xen-doc-html-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091229" comment="xen-doc-pdf-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091230" comment="xen-tools-4.1.6_01-5.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4363</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.  NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091125" comment="ruby19-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091126" comment="ruby19-devel-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091127" comment="ruby19-devel-extra-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091128" comment="ruby19-doc-ri-1.9.3.p392-3.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091129" comment="ruby19-tk-1.9.3.p392-3.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4365</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4365" source="CVE"/>
    <description>
    Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091134" comment="apache2-mod_fcgid-2.3.6-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091347" comment="apache2-mod_fcgid-2.3.6-9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4368</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" source="CVE"/>
    <description>
    The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091220" comment="xen-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091221" comment="xen-devel-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091222" comment="xen-kmp-default-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091223" comment="xen-kmp-desktop-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091224" comment="xen-kmp-pae-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091225" comment="xen-libs-32bit-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091226" comment="xen-libs-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091227" comment="xen-tools-domU-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091228" comment="xen-doc-html-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091229" comment="xen-doc-pdf-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091230" comment="xen-tools-4.1.6_01-5.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4389</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092251" comment="rubygem-activesupport-3_2-3.2.12-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092252" comment="rubygem-activesupport-3_2-doc-3.2.12-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092253" comment="rubygem-actionmailer-3_2-3.2.12-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092254" comment="rubygem-actionmailer-3_2-doc-3.2.12-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092513" comment="rubygem-actionpack-3_2-3.2.12-3.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092514" comment="rubygem-actionpack-3_2-doc-3.2.12-3.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091130" comment="xorg-x11-Xvnc-7.6_1.12.3-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091131" comment="xorg-x11-server-7.6_1.12.3-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091132" comment="xorg-x11-server-extra-7.6_1.12.3-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091133" comment="xorg-x11-server-sdk-7.6_1.12.3-1.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091013" comment="gpg2-2.0.19-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091014" comment="gpg2-lang-2.0.19-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091220" comment="xen-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091221" comment="xen-devel-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091222" comment="xen-kmp-default-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091223" comment="xen-kmp-desktop-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091224" comment="xen-kmp-pae-4.1.6_01_k3.4.47_2.38-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091225" comment="xen-libs-32bit-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091226" comment="xen-libs-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091227" comment="xen-tools-domU-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091228" comment="xen-doc-html-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091229" comment="xen-doc-pdf-4.1.6_01-5.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091230" comment="xen-tools-4.1.6_01-5.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4450</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4450" source="CVE"/>
    <description>
    The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091892" comment="nodejs-0.6.19-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091893" comment="nodejs-devel-0.6.19-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <description>
    Samba 3.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091692" comment="samba-doc-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091693" comment="libnetapi-devel-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091694" comment="libnetapi0-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091695" comment="libsmbclient-devel-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091696" comment="libsmbclient0-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091697" comment="libsmbclient0-32bit-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091698" comment="libsmbsharemodes-devel-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091699" comment="libsmbsharemodes0-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091700" comment="libwbclient-devel-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091701" comment="libwbclient0-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091702" comment="libwbclient0-32bit-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091703" comment="samba-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091704" comment="samba-32bit-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091705" comment="samba-client-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091706" comment="samba-client-32bit-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091707" comment="samba-devel-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091708" comment="samba-krb-printing-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091709" comment="samba-winbind-3.6.7-48.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091710" comment="samba-winbind-32bit-3.6.7-48.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4484</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4484" source="CVE"/>
    <description>
    Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091416" comment="libvarnishapi1-3.0.2-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091417" comment="varnish-3.0.2-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091418" comment="varnish-devel-3.0.2-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4491</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092005" comment="rubygem-actionpack-3_2-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092006" comment="rubygem-actionpack-3_2-doc-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092513" comment="rubygem-actionpack-3_2-3.2.12-3.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092514" comment="rubygem-actionpack-3_2-doc-3.2.12-3.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4492</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4492" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092245" comment="rubygem-i18n-0_6-0.6.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092246" comment="rubygem-i18n-0_6-doc-0.6.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092247" comment="rubygem-i18n-0_6-testsuite-0.6.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4505</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505" source="CVE"/>
    <description>
    The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091879" comment="libsvn_auth_gnome_keyring-1-0-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091880" comment="libsvn_auth_kwallet-1-0-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091881" comment="subversion-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091882" comment="subversion-bash-completion-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091883" comment="subversion-devel-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091884" comment="subversion-perl-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091885" comment="subversion-python-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091886" comment="subversion-server-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091887" comment="subversion-tools-1.7.14-4.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4508</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4508" source="CVE"/>
    <description>
    lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092889" comment="lighttpd-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092890" comment="lighttpd-mod_cml-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092891" comment="lighttpd-mod_geoip-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092892" comment="lighttpd-mod_magnet-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092893" comment="lighttpd-mod_mysql_vhost-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092894" comment="lighttpd-mod_rrdtool-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092895" comment="lighttpd-mod_trigger_b4_dl-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092896" comment="lighttpd-mod_webdav-1.4.31-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091888" comment="curl-7.25.0-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091889" comment="libcurl-devel-7.25.0-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091890" comment="libcurl4-32bit-7.25.0-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091891" comment="libcurl4-7.25.0-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4547</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547" source="CVE"/>
    <description>
    nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091756" comment="nginx-1.0-1.0.15-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092900" comment="libqt4-devel-doc-4.8.1-2.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092901" comment="libqt4-devel-doc-data-4.8.1-2.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092902" comment="qt4-x11-tools-4.8.1-2.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092903" comment="libqt4-sql-mysql-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092904" comment="libqt4-sql-mysql-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092905" comment="libqt4-sql-plugins-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092906" comment="libqt4-sql-postgresql-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092907" comment="libqt4-sql-postgresql-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092908" comment="libqt4-sql-unixODBC-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092909" comment="libqt4-sql-unixODBC-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092910" comment="libqt4-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092911" comment="libqt4-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092912" comment="libqt4-devel-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092913" comment="libqt4-private-headers-devel-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092914" comment="libqt4-qt3support-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092915" comment="libqt4-qt3support-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092916" comment="libqt4-sql-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092917" comment="libqt4-sql-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092918" comment="libqt4-sql-sqlite-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092919" comment="libqt4-sql-sqlite-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092920" comment="libqt4-x11-32bit-4.8.1-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092921" comment="libqt4-x11-4.8.1-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4558</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558" source="CVE"/>
    <description>
    The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091879" comment="libsvn_auth_gnome_keyring-1-0-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091880" comment="libsvn_auth_kwallet-1-0-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091881" comment="subversion-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091882" comment="subversion-bash-completion-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091883" comment="subversion-devel-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091884" comment="subversion-perl-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091885" comment="subversion-python-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091886" comment="subversion-server-1.7.14-4.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091887" comment="subversion-tools-1.7.14-4.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4559</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4559" source="CVE"/>
    <description>
    lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092889" comment="lighttpd-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092890" comment="lighttpd-mod_cml-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092891" comment="lighttpd-mod_geoip-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092892" comment="lighttpd-mod_magnet-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092893" comment="lighttpd-mod_mysql_vhost-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092894" comment="lighttpd-mod_rrdtool-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092895" comment="lighttpd-mod_trigger_b4_dl-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092896" comment="lighttpd-mod_webdav-1.4.31-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4560</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4560" source="CVE"/>
    <description>
    Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092889" comment="lighttpd-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092890" comment="lighttpd-mod_cml-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092891" comment="lighttpd-mod_geoip-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092892" comment="lighttpd-mod_magnet-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092893" comment="lighttpd-mod_mysql_vhost-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092894" comment="lighttpd-mod_rrdtool-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092895" comment="lighttpd-mod_trigger_b4_dl-1.4.31-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092896" comment="lighttpd-mod_webdav-1.4.31-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4635</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4635" source="CVE"/>
    <description>
    Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080501" comment="apache2-mod_php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080503" comment="php5-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080504" comment="php5-bcmath-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080506" comment="php5-bz2-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080508" comment="php5-calendar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080510" comment="php5-ctype-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080512" comment="php5-curl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080514" comment="php5-dba-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080518" comment="php5-devel-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080519" comment="php5-dom-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080521" comment="php5-enchant-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080523" comment="php5-exif-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080525" comment="php5-fastcgi-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080527" comment="php5-fileinfo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080529" comment="php5-fpm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080531" comment="php5-ftp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080533" comment="php5-gd-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080535" comment="php5-gettext-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080537" comment="php5-gmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080539" comment="php5-iconv-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080541" comment="php5-imap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080543" comment="php5-intl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080545" comment="php5-json-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080547" comment="php5-ldap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080549" comment="php5-mbstring-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080551" comment="php5-mcrypt-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080553" comment="php5-mssql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080555" comment="php5-mysql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080557" comment="php5-odbc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080559" comment="php5-openssl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080561" comment="php5-pcntl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080563" comment="php5-pdo-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080565" comment="php5-pear-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080566" comment="php5-pgsql-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080568" comment="php5-phar-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080570" comment="php5-posix-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080572" comment="php5-pspell-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080574" comment="php5-readline-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080576" comment="php5-shmop-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080578" comment="php5-snmp-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080580" comment="php5-soap-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080582" comment="php5-sockets-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080584" comment="php5-sqlite-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080586" comment="php5-suhosin-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080588" comment="php5-sysvmsg-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080590" comment="php5-sysvsem-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080592" comment="php5-sysvshm-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080594" comment="php5-tidy-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080596" comment="php5-tokenizer-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080598" comment="php5-wddx-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080600" comment="php5-xmlreader-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080602" comment="php5-xmlrpc-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080604" comment="php5-xmlwriter-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080606" comment="php5-xsl-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080608" comment="php5-zip-5.3.15-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080610" comment="php5-zlib-5.3.15-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4717</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4717" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089864" comment="otrs-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089865" comment="otrs-doc-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089866" comment="otrs-itsm-3.1.10-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4718</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4718" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089864" comment="otrs-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089865" comment="otrs-doc-3.1.18-20.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089866" comment="otrs-itsm-3.1.10-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4852</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4852" source="CVE"/>
    <description>
    Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090117" comment="filezilla-3.7.3-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090120" comment="filezilla-lang-3.7.3-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090231" comment="bind-9.9.2P2-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090232" comment="bind-chrootenv-9.9.2P2-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090235" comment="bind-devel-9.9.2P2-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090236" comment="bind-doc-9.9.2P2-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090237" comment="bind-libs-32bit-9.9.2P2-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090238" comment="bind-libs-9.9.2P2-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090241" comment="bind-lwresd-9.9.2P2-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090243" comment="bind-utils-9.9.2P2-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4885</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4885" source="CVE"/>
    <description>
    The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091112" comment="ncat-6.01-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091113" comment="ndiff-6.01-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091114" comment="nmap-6.01-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091115" comment="nping-6.01-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091116" comment="zenmap-6.01-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4927</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927" source="CVE"/>
    <description>
    Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080683" comment="wireshark-1.8.9-1.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080686" comment="wireshark-devel-1.8.9-1.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5018</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018" source="CVE"/>
    <description>
    The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089914" comment="strongswan-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089916" comment="strongswan-doc-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089917" comment="strongswan-ikev1-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089919" comment="strongswan-ikev2-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089921" comment="strongswan-ipsec-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089923" comment="strongswan-libs0-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089925" comment="strongswan-mysql-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089927" comment="strongswan-nm-4.6.4-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089929" comment="strongswan-sqlite-4.6.4-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5029</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029" source="CVE"/>
    <description>
    phpMyAdmin 3.5.x and 4.0.x before 4.0.5 allows remote attackers to bypass the clickjacking protection mechanism via certain vectors related to Header.class.php.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089964" comment="phpMyAdmin-4.0.5-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5590</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5591</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5592</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5593</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" source="CVE"/>
    <description>
    The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5595</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5596</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" source="CVE"/>
    <description>
    The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5597</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5598</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" source="CVE"/>
    <description>
    PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5599</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5600</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5601</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5602</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" source="CVE"/>
    <description>
    The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5603</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5604</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" source="CVE"/>
    <description>
    The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091231" comment="MozillaFirefox-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091232" comment="MozillaFirefox-branding-upstream-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091233" comment="MozillaFirefox-buildsymbols-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091234" comment="MozillaFirefox-devel-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091235" comment="MozillaFirefox-translations-common-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091236" comment="MozillaFirefox-translations-other-25.0-2.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091237" comment="MozillaThunderbird-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091238" comment="MozillaThunderbird-buildsymbols-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091239" comment="MozillaThunderbird-devel-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091240" comment="MozillaThunderbird-translations-common-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091241" comment="MozillaThunderbird-translations-other-24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091242" comment="enigmail-1.6.0+24.1.0-49.59.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091243" comment="mozilla-nspr-32bit-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091244" comment="mozilla-nspr-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091245" comment="mozilla-nspr-devel-4.10.1-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091246" comment="mozilla-js-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091247" comment="mozilla-js-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091248" comment="xulrunner-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091249" comment="xulrunner-32bit-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091250" comment="xulrunner-buildsymbols-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091251" comment="xulrunner-devel-17.0.10-2.56.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091309" comment="seamonkey-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091310" comment="seamonkey-dom-inspector-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091311" comment="seamonkey-irc-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091312" comment="seamonkey-translations-common-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091313" comment="seamonkey-translations-other-2.22-2.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091314" comment="seamonkey-venkman-2.22-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091450" comment="mozilla-nspr-32bit-4.10.2-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091451" comment="mozilla-nspr-4.10.2-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091452" comment="mozilla-nspr-devel-4.10.2-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091453" comment="libfreebl3-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091454" comment="libfreebl3-32bit-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091455" comment="libsoftokn3-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091456" comment="libsoftokn3-32bit-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091457" comment="mozilla-nss-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091458" comment="mozilla-nss-32bit-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091459" comment="mozilla-nss-certs-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091460" comment="mozilla-nss-certs-32bit-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091461" comment="mozilla-nss-devel-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091462" comment="mozilla-nss-sysinit-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091463" comment="mozilla-nss-sysinit-32bit-3.15.3-2.31.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091464" comment="mozilla-nss-tools-3.15.3-2.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5645</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5645" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail before 0.9.3 allow user-assisted remote attackers to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090384" comment="roundcubemail-0.9.3-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5718</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" source="CVE"/>
    <description>
    The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090690" comment="wireshark-1.8.10-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090693" comment="wireshark-devel-1.8.10-1.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5719</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719" source="CVE"/>
    <description>
    epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090690" comment="wireshark-1.8.10-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090693" comment="wireshark-devel-1.8.10-1.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5720</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" source="CVE"/>
    <description>
    Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090690" comment="wireshark-1.8.10-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090693" comment="wireshark-devel-1.8.10-1.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5721</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" source="CVE"/>
    <description>
    The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090690" comment="wireshark-1.8.10-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090693" comment="wireshark-devel-1.8.10-1.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5722</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090690" comment="wireshark-1.8.10-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090693" comment="wireshark-devel-1.8.10-1.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5805</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5806</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091342" comment="java-1_7_0-openjdk-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091343" comment="java-1_7_0-openjdk-demo-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091344" comment="java-1_7_0-openjdk-devel-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091345" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-3.48.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091346" comment="java-1_7_0-openjdk-src-1.7.0.6-3.48.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091358" comment="wireshark-1.8.11-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091359" comment="wireshark-devel-1.8.11-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091358" comment="wireshark-1.8.11-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091359" comment="wireshark-devel-1.8.11-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091358" comment="wireshark-1.8.11-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091359" comment="wireshark-devel-1.8.11-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091358" comment="wireshark-1.8.11-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091359" comment="wireshark-devel-1.8.11-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091358" comment="wireshark-1.8.11-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091359" comment="wireshark-devel-1.8.11-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093071" comment="hplip-3.12.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093072" comment="hplip-hpijs-3.12.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093073" comment="hplip-sane-3.12.4-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6411</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6411" source="CVE"/>
    <description>
    The HandleCrashedAircraft function in aircraft_cmd.cpp in OpenTTD 0.3.6 through 1.3.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) by crashing an aircraft outside of the map.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092248" comment="openttd-1.2.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092249" comment="openttd-data-1.2.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092250" comment="openttd-dedicated-1.2.2-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6414</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414" source="CVE"/>
    <description>
    actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092005" comment="rubygem-actionpack-3_2-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092006" comment="rubygem-actionpack-3_2-doc-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092513" comment="rubygem-actionpack-3_2-3.2.12-3.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092514" comment="rubygem-actionpack-3_2-doc-3.2.12-3.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6415</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092002" comment="rubygem-actionpack-2_3-2.3.17-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092003" comment="rubygem-actionpack-2_3-doc-2.3.17-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092004" comment="rubygem-actionpack-2_3-testsuite-2.3.17-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092005" comment="rubygem-actionpack-3_2-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092006" comment="rubygem-actionpack-3_2-doc-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092513" comment="rubygem-actionpack-3_2-3.2.12-3.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092514" comment="rubygem-actionpack-3_2-doc-3.2.12-3.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6417</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092005" comment="rubygem-actionpack-3_2-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092006" comment="rubygem-actionpack-3_2-doc-3.2.12-3.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092513" comment="rubygem-actionpack-3_2-3.2.12-3.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092514" comment="rubygem-actionpack-3_2-doc-3.2.12-3.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6420</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420" source="CVE"/>
    <description>
    The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092301" comment="apache2-mod_php5-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092302" comment="php5-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092303" comment="php5-bcmath-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092304" comment="php5-bz2-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092305" comment="php5-calendar-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092306" comment="php5-ctype-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092307" comment="php5-curl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092308" comment="php5-dba-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092309" comment="php5-devel-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092310" comment="php5-dom-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092311" comment="php5-enchant-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092312" comment="php5-exif-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092313" comment="php5-fastcgi-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092314" comment="php5-fileinfo-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092315" comment="php5-fpm-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092316" comment="php5-ftp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092317" comment="php5-gd-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092318" comment="php5-gettext-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092319" comment="php5-gmp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092320" comment="php5-iconv-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092321" comment="php5-imap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092322" comment="php5-intl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092323" comment="php5-json-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092324" comment="php5-ldap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092325" comment="php5-mbstring-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092326" comment="php5-mcrypt-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092327" comment="php5-mssql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092328" comment="php5-mysql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092329" comment="php5-odbc-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092330" comment="php5-openssl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092331" comment="php5-pcntl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092332" comment="php5-pdo-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092333" comment="php5-pear-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092334" comment="php5-pgsql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092335" comment="php5-phar-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092336" comment="php5-posix-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092337" comment="php5-pspell-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092338" comment="php5-readline-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092339" comment="php5-shmop-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092340" comment="php5-snmp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092341" comment="php5-soap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092342" comment="php5-sockets-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092343" comment="php5-sqlite-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092344" comment="php5-suhosin-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092345" comment="php5-sysvmsg-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092346" comment="php5-sysvsem-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092347" comment="php5-sysvshm-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092348" comment="php5-tidy-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092349" comment="php5-tokenizer-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092350" comment="php5-wddx-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092351" comment="php5-xmlreader-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092352" comment="php5-xmlrpc-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092353" comment="php5-xmlwriter-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092354" comment="php5-xsl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092355" comment="php5-zip-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092356" comment="php5-zlib-5.3.15-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092357" comment="xorg-x11-Xvnc-7.6_1.12.3-1.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092358" comment="xorg-x11-server-7.6_1.12.3-1.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092359" comment="xorg-x11-server-extra-7.6_1.12.3-1.41.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092360" comment="xorg-x11-server-sdk-7.6_1.12.3-1.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6425</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425" source="CVE"/>
    <description>
    Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092523" comment="libpixman-1-0-0.24.4-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092524" comment="libpixman-1-0-32bit-0.24.4-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092525" comment="libpixman-1-0-devel-0.24.4-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092526" comment="pixman-0.24.4-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6427</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" source="CVE"/>
    <description>
    upgrade.py in the hp-upgrade service in HP Linux Imaging and Printing (HPLIP) 3.x through 3.13.11 launches a program from an http URL, which allows man-in-the-middle attackers to execute arbitrary code by gaining control over the client-server data stream.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093071" comment="hplip-3.12.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093072" comment="hplip-hpijs-3.12.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093073" comment="hplip-sane-3.12.4-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6449</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449" source="CVE"/>
    <description>
    The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092527" comment="libopenssl-devel-1.0.1e-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092528" comment="libopenssl-devel-32bit-1.0.1e-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092529" comment="libopenssl1_0_0-1.0.1e-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092530" comment="libopenssl1_0_0-32bit-1.0.1e-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092531" comment="openssl-1.0.1e-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092532" comment="openssl-doc-1.0.1e-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092702" comment="libopenssl-devel-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092703" comment="libopenssl-devel-32bit-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092704" comment="libopenssl1_0_0-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092705" comment="libopenssl1_0_0-32bit-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092706" comment="openssl-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092707" comment="openssl-doc-1.0.1e-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6450</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450" source="CVE"/>
    <description>
    The DTLS retransmission implementation in OpenSSL through 0.9.8y and 1.x through 1.0.1e does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092702" comment="libopenssl-devel-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092703" comment="libopenssl-devel-32bit-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092704" comment="libopenssl1_0_0-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092705" comment="libopenssl1_0_0-32bit-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092706" comment="openssl-1.0.1e-2.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092707" comment="openssl-doc-1.0.1e-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092922" comment="libXfont-1.4.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092923" comment="libXfont-devel-1.4.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092924" comment="libXfont-devel-32bit-1.4.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092925" comment="libXfont1-1.4.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092926" comment="libXfont1-32bit-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6621</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6622</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the movement of a media element between documents.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6623</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623" source="CVE"/>
    <description>
    The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6624</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6625</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of DOM range objects in circumstances that require child node removal after a (1) mutation or (2) blur event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6626</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626" source="CVE"/>
    <description>
    The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6627</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627" source="CVE"/>
    <description>
    net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6628</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628" source="CVE"/>
    <description>
    net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6630</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630" source="CVE"/>
    <description>
    The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6631</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6632</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632" source="CVE"/>
    <description>
    Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091680" comment="chromedriver-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091681" comment="chromium-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091682" comment="chromium-desktop-gnome-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091683" comment="chromium-desktop-kde-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091684" comment="chromium-ffmpegsumo-31.0.1650.57-1.54.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091685" comment="chromium-suid-helper-31.0.1650.57-1.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6634</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6634" source="CVE"/>
    <description>
    The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092239" comment="chromedriver-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092240" comment="chromium-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092241" comment="chromium-desktop-gnome-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092242" comment="chromium-desktop-kde-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092243" comment="chromium-ffmpegsumo-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092244" comment="chromium-suid-helper-31.0.1650.63-1.58.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6635</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6635" source="CVE"/>
    <description>
    Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092239" comment="chromedriver-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092240" comment="chromium-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092241" comment="chromium-desktop-gnome-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092242" comment="chromium-desktop-kde-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092243" comment="chromium-ffmpegsumo-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092244" comment="chromium-suid-helper-31.0.1650.63-1.58.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6636</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6636" source="CVE"/>
    <description>
    The FrameLoader::notifyIfInitialDocumentAccessed function in core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 31.0.1650.63, makes an incorrect check for an empty document during presentation of a modal dialog, which allows remote attackers to spoof the address bar via vectors involving the document.write method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092239" comment="chromedriver-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092240" comment="chromium-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092241" comment="chromium-desktop-gnome-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092242" comment="chromium-desktop-kde-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092243" comment="chromium-ffmpegsumo-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092244" comment="chromium-suid-helper-31.0.1650.63-1.58.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6637</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6637" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092239" comment="chromedriver-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092240" comment="chromium-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092241" comment="chromium-desktop-gnome-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092242" comment="chromium-desktop-kde-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092243" comment="chromium-ffmpegsumo-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092244" comment="chromium-suid-helper-31.0.1650.63-1.58.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6638</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6638" source="CVE"/>
    <description>
    Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092239" comment="chromedriver-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092240" comment="chromium-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092241" comment="chromium-desktop-gnome-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092242" comment="chromium-desktop-kde-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092243" comment="chromium-ffmpegsumo-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092244" comment="chromium-suid-helper-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092999" comment="libv8-3-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093000" comment="v8-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093001" comment="v8-devel-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093002" comment="v8-private-headers-devel-3.22.24.8-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6639</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639" source="CVE"/>
    <description>
    The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092239" comment="chromedriver-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092240" comment="chromium-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092241" comment="chromium-desktop-gnome-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092242" comment="chromium-desktop-kde-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092243" comment="chromium-ffmpegsumo-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092244" comment="chromium-suid-helper-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092999" comment="libv8-3-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093000" comment="v8-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093001" comment="v8-devel-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093002" comment="v8-private-headers-devel-3.22.24.8-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6640</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640" source="CVE"/>
    <description>
    The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092239" comment="chromedriver-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092240" comment="chromium-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092241" comment="chromium-desktop-gnome-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092242" comment="chromium-desktop-kde-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092243" comment="chromium-ffmpegsumo-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092244" comment="chromium-suid-helper-31.0.1650.63-1.58.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092999" comment="libv8-3-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093000" comment="v8-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093001" comment="v8-devel-3.22.24.8-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093002" comment="v8-private-headers-devel-3.22.24.8-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092041" comment="MozillaFirefox-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092042" comment="MozillaFirefox-branding-upstream-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092043" comment="MozillaFirefox-buildsymbols-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092044" comment="MozillaFirefox-devel-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092045" comment="MozillaFirefox-translations-common-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092046" comment="MozillaFirefox-translations-other-26.0-2.67.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092292" comment="MozillaThunderbird-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092293" comment="MozillaThunderbird-buildsymbols-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092294" comment="MozillaThunderbird-devel-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092295" comment="MozillaThunderbird-translations-common-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092296" comment="MozillaThunderbird-translations-other-24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092297" comment="enigmail-1.6.0+24.2.0-49.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092515" comment="seamonkey-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092516" comment="seamonkey-dom-inspector-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092517" comment="seamonkey-irc-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092518" comment="seamonkey-translations-common-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092519" comment="seamonkey-translations-other-2.23-2.58.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092520" comment="seamonkey-venkman-2.23-2.58.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6712</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712" source="CVE"/>
    <description>
    The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092301" comment="apache2-mod_php5-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092302" comment="php5-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092303" comment="php5-bcmath-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092304" comment="php5-bz2-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092305" comment="php5-calendar-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092306" comment="php5-ctype-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092307" comment="php5-curl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092308" comment="php5-dba-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092309" comment="php5-devel-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092310" comment="php5-dom-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092311" comment="php5-enchant-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092312" comment="php5-exif-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092313" comment="php5-fastcgi-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092314" comment="php5-fileinfo-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092315" comment="php5-fpm-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092316" comment="php5-ftp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092317" comment="php5-gd-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092318" comment="php5-gettext-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092319" comment="php5-gmp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092320" comment="php5-iconv-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092321" comment="php5-imap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092322" comment="php5-intl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092323" comment="php5-json-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092324" comment="php5-ldap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092325" comment="php5-mbstring-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092326" comment="php5-mcrypt-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092327" comment="php5-mssql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092328" comment="php5-mysql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092329" comment="php5-odbc-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092330" comment="php5-openssl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092331" comment="php5-pcntl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092332" comment="php5-pdo-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092333" comment="php5-pear-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092334" comment="php5-pgsql-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092335" comment="php5-phar-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092336" comment="php5-posix-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092337" comment="php5-pspell-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092338" comment="php5-readline-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092339" comment="php5-shmop-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092340" comment="php5-snmp-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092341" comment="php5-soap-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092342" comment="php5-sockets-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092343" comment="php5-sqlite-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092344" comment="php5-suhosin-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092345" comment="php5-sysvmsg-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092346" comment="php5-sysvsem-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092347" comment="php5-sysvshm-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092348" comment="php5-tidy-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092349" comment="php5-tokenizer-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092350" comment="php5-wddx-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092351" comment="php5-xmlreader-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092352" comment="php5-xmlrpc-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092353" comment="php5-xmlwriter-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092354" comment="php5-xsl-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092355" comment="php5-zip-5.3.15-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092356" comment="php5-zlib-5.3.15-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6836</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6836" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ms_escher_get_data function in plugins/excel/ms-escher.c in GNOME Office Gnumeric before 1.12.9 allows remote attackers to cause a denial of service (crash) via a crafted xls file with a crafted length value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093109" comment="gnumeric-1.11.3-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093110" comment="gnumeric-devel-1.11.3-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093111" comment="gnumeric-lang-1.11.3-2.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6838</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6838" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093109" comment="gnumeric-1.11.3-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093110" comment="gnumeric-devel-1.11.3-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093111" comment="gnumeric-lang-1.11.3-2.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7108</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108" source="CVE"/>
    <description>
    Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092533" comment="nagios-3.5.0-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092534" comment="nagios-devel-3.5.0-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092535" comment="nagios-www-3.5.0-2.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092536" comment="nagios-www-dch-3.5.0-2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092521" comment="wireshark-1.8.12-1.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092522" comment="wireshark-devel-1.8.12-1.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092521" comment="wireshark-1.8.12-1.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092522" comment="wireshark-devel-1.8.12-1.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092521" comment="wireshark-1.8.12-1.47.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092522" comment="wireshark-devel-1.8.12-1.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0979</title>
    <affected family="unix">
            <platform>openSUSE 12.2 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0979" source="CVE"/>
    <description>
    The start_authentication function in lightdm-gtk-greeter.c in LightDM GTK+ Greeter before 1.7.1 does not properly handle the return value from the lightdm_greeter_get_authentication_user function, which allows local users to cause a denial of service (NULL pointer dereference) via an empty username.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092897" comment="lightdm-gtk-greeter-1.1.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092898" comment="lightdm-gtk-greeter-branding-upstream-1.1.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092899" comment="lightdm-gtk-greeter-lang-1.1.6-2.4.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077821" version="1" comment="dbus-1-x11 is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077824" version="1" comment="dbus-1 is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077825" version="1" comment="dbus-1-32bit is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077829" version="1" comment="dbus-1-devel is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077830" version="1" comment="dbus-1-devel-32bit is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077831" version="1" comment="dbus-1-devel-doc is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077832" version="1" comment="libdbus-1-3 is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077833" version="1" comment="libdbus-1-3-32bit is &lt;1.5.12-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077836" version="1" comment="claws-mail is &lt;3.8.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077839" version="1" comment="claws-mail-devel is &lt;3.8.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077840" version="1" comment="claws-mail-lang is &lt;3.8.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077841" version="1" comment="libqt4-devel-doc is &lt;4.8.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077842" version="1" comment="libqt4-devel-doc-data is &lt;4.8.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077845" version="1" comment="qt4-x11-tools is &lt;4.8.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077847" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077848" version="1" comment="libqt4-sql-mysql is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077851" version="1" comment="libqt4-sql-plugins is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077853" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077854" version="1" comment="libqt4-sql-postgresql is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077857" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077858" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077861" version="1" comment="libqt4-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077862" version="1" comment="libqt4 is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077866" version="1" comment="libqt4-devel is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077868" version="1" comment="libqt4-private-headers-devel is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077869" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077870" version="1" comment="libqt4-qt3support is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077873" version="1" comment="libqt4-sql-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077874" version="1" comment="libqt4-sql is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077877" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077878" version="1" comment="libqt4-sql-sqlite is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077881" version="1" comment="libqt4-x11-32bit is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077882" version="1" comment="libqt4-x11 is &lt;4.8.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077885" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077888" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077890" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077892" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077893" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077894" version="1" comment="automake-testsuite is &lt;1.12.1-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077895" version="1" comment="automake is &lt;1.12.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077896" version="1" comment="exim is &lt;4.80.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077899" version="1" comment="eximon is &lt;4.80.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077901" version="1" comment="eximstats-html is &lt;4.80.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077902" version="1" comment="cgit is &lt;0.9.0.2-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077905" version="1" comment="MozillaFirefox is &lt;16.0.2-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077906" version="1" comment="MozillaFirefox-branding-upstream is &lt;16.0.2-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077907" version="1" comment="MozillaFirefox-buildsymbols is &lt;16.0.2-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077910" version="1" comment="MozillaFirefox-devel is &lt;16.0.2-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077911" version="1" comment="MozillaFirefox-translations-common is &lt;16.0.2-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077912" version="1" comment="MozillaFirefox-translations-other is &lt;16.0.2-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077913" version="1" comment="MozillaThunderbird is &lt;16.0.2-49.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077914" version="1" comment="MozillaThunderbird-buildsymbols is &lt;16.0.2-49.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077917" version="1" comment="MozillaThunderbird-devel is &lt;16.0.2-49.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077919" version="1" comment="MozillaThunderbird-translations-common is &lt;16.0.2-49.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077920" version="1" comment="MozillaThunderbird-translations-other is &lt;16.0.2-49.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077921" version="1" comment="enigmail is &lt;1.4.5.+16.0.2-49.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077923" version="1" comment="seamonkey is &lt;2.13.2-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077926" version="1" comment="seamonkey-dom-inspector is &lt;2.13.2-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077927" version="1" comment="seamonkey-irc is &lt;2.13.2-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077928" version="1" comment="seamonkey-translations-common is &lt;2.13.2-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077929" version="1" comment="seamonkey-translations-other is &lt;2.13.2-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077930" version="1" comment="seamonkey-venkman is &lt;2.13.2-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077931" version="1" comment="mozilla-js is &lt;16.0.2-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077932" version="1" comment="mozilla-js-32bit is &lt;16.0.2-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077935" version="1" comment="xulrunner is &lt;16.0.2-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077936" version="1" comment="xulrunner-32bit is &lt;16.0.2-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077937" version="1" comment="xulrunner-buildsymbols is &lt;16.0.2-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077941" version="1" comment="xulrunner-devel is &lt;16.0.2-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077943" version="1" comment="ruby19 is &lt;1.9.3.p194-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077946" version="1" comment="ruby19-devel is &lt;1.9.3.p194-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077947" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p194-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077948" version="1" comment="ruby19-tk is &lt;1.9.3.p194-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077950" version="1" comment="mcrypt is &lt;2.6.8-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077953" version="1" comment="plib is &lt;1.8.5-76.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077956" version="1" comment="plib-devel is &lt;1.8.5-76.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077957" version="1" comment="phpMyAdmin is &lt;3.5.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077958" version="1" comment="libreoffice-branding-upstream is &lt;3.5.4.13-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077959" version="1" comment="libreoffice-help-en-US is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077960" version="1" comment="libreoffice-help-cs is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077961" version="1" comment="libreoffice-help-da is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077962" version="1" comment="libreoffice-help-de is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077963" version="1" comment="libreoffice-help-en-GB is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077964" version="1" comment="libreoffice-help-group1 is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077965" version="1" comment="libreoffice-help-en-ZA is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077966" version="1" comment="libreoffice-help-es is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077967" version="1" comment="libreoffice-help-et is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077968" version="1" comment="libreoffice-help-fr is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077969" version="1" comment="libreoffice-help-gl is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077970" version="1" comment="libreoffice-help-group2 is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077971" version="1" comment="libreoffice-help-group3 is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077972" version="1" comment="libreoffice-help-gu-IN is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077973" version="1" comment="libreoffice-help-hi-IN is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077974" version="1" comment="libreoffice-help-hu is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077975" version="1" comment="libreoffice-help-it is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077976" version="1" comment="libreoffice-help-ja is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077977" version="1" comment="libreoffice-help-km is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077978" version="1" comment="libreoffice-help-group4 is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077979" version="1" comment="libreoffice-help-ko is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077980" version="1" comment="libreoffice-help-nl is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077981" version="1" comment="libreoffice-help-pl is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077982" version="1" comment="libreoffice-help-pt is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077983" version="1" comment="libreoffice-help-group5 is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077984" version="1" comment="libreoffice-help-pt-BR is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077985" version="1" comment="libreoffice-help-ru is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077986" version="1" comment="libreoffice-help-sl is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077987" version="1" comment="libreoffice-help-sv is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077988" version="1" comment="libreoffice-help-zh-CN is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077989" version="1" comment="libreoffice-help-zh-TW is &lt;3.5.4.13-1.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077990" version="1" comment="libreoffice-icon-theme-crystal is &lt;3.5.4.13-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077991" version="1" comment="libreoffice-icon-theme-galaxy is &lt;3.5.4.13-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077992" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;3.5.4.13-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077993" version="1" comment="libreoffice-icon-theme-oxygen is &lt;3.5.4.13-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077994" version="1" comment="libreoffice-icon-theme-tango is &lt;3.5.4.13-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077995" version="1" comment="libreoffice-icon-themes is &lt;3.5.4.13-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077996" version="1" comment="libreoffice-l10n is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077997" version="1" comment="libreoffice-l10n-af is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077998" version="1" comment="libreoffice-l10n-ar is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077999" version="1" comment="libreoffice-l10n-be-BY is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078000" version="1" comment="libreoffice-l10n-bg is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078001" version="1" comment="libreoffice-l10n-br is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078002" version="1" comment="libreoffice-l10n-ca is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078003" version="1" comment="libreoffice-l10n-cs is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078004" version="1" comment="libreoffice-l10n-cy is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078005" version="1" comment="libreoffice-l10n-da is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078006" version="1" comment="libreoffice-l10n-de is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078007" version="1" comment="libreoffice-l10n-el is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078008" version="1" comment="libreoffice-l10n-en-GB is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078009" version="1" comment="libreoffice-l10n-en-ZA is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078010" version="1" comment="libreoffice-l10n-es is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078011" version="1" comment="libreoffice-l10n-et is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078012" version="1" comment="libreoffice-l10n-fi is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078013" version="1" comment="libreoffice-l10n-fr is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078014" version="1" comment="libreoffice-l10n-ga is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078015" version="1" comment="libreoffice-l10n-gl is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078016" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078017" version="1" comment="libreoffice-l10n-he is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078018" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078019" version="1" comment="libreoffice-l10n-hr is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078020" version="1" comment="libreoffice-l10n-hu is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078021" version="1" comment="libreoffice-l10n-it is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078022" version="1" comment="libreoffice-l10n-ja is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078023" version="1" comment="libreoffice-l10n-ka is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078024" version="1" comment="libreoffice-l10n-km is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078025" version="1" comment="libreoffice-l10n-ko is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078026" version="1" comment="libreoffice-l10n-lt is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078027" version="1" comment="libreoffice-l10n-mk is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078028" version="1" comment="libreoffice-l10n-nb is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078029" version="1" comment="libreoffice-l10n-nl is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078030" version="1" comment="libreoffice-l10n-nn is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078031" version="1" comment="libreoffice-l10n-nr is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078032" version="1" comment="libreoffice-l10n-pa-IN is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078033" version="1" comment="libreoffice-l10n-pl is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078034" version="1" comment="libreoffice-l10n-pt is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078035" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078036" version="1" comment="libreoffice-l10n-ru is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078037" version="1" comment="libreoffice-l10n-rw is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078038" version="1" comment="libreoffice-l10n-sh is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078039" version="1" comment="libreoffice-l10n-sk is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078040" version="1" comment="libreoffice-l10n-sl is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078041" version="1" comment="libreoffice-l10n-sr is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078042" version="1" comment="libreoffice-l10n-ss is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078043" version="1" comment="libreoffice-l10n-st is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078044" version="1" comment="libreoffice-l10n-sv is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078045" version="1" comment="libreoffice-l10n-tg is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078046" version="1" comment="libreoffice-l10n-th is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078047" version="1" comment="libreoffice-l10n-tr is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078048" version="1" comment="libreoffice-l10n-ts is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078049" version="1" comment="libreoffice-l10n-uk is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078050" version="1" comment="libreoffice-l10n-ve is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078051" version="1" comment="libreoffice-l10n-vi is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078052" version="1" comment="libreoffice-l10n-xh is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078053" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078054" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078055" version="1" comment="libreoffice-l10n-zu is &lt;3.5.4.13-1.4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078056" version="1" comment="libreoffice is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078057" version="1" comment="libreoffice-base is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078059" version="1" comment="libreoffice-base-drivers-mysql is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078061" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078063" version="1" comment="libreoffice-base-extensions is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078064" version="1" comment="libreoffice-calc is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078066" version="1" comment="libreoffice-calc-extensions is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078069" version="1" comment="libreoffice-draw is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078070" version="1" comment="libreoffice-draw-extensions is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078072" version="1" comment="libreoffice-filters-optional is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078074" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078076" version="1" comment="libreoffice-icon-themes-prebuilt is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078077" version="1" comment="libreoffice-impress is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078079" version="1" comment="libreoffice-impress-extensions is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078081" version="1" comment="libreoffice-kde is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078083" version="1" comment="libreoffice-kde4 is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078085" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078086" version="1" comment="libreoffice-mailmerge is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078087" version="1" comment="libreoffice-math is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078089" version="1" comment="libreoffice-officebean is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078091" version="1" comment="libreoffice-pyuno is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078093" version="1" comment="libreoffice-sdk is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078095" version="1" comment="libreoffice-sdk-doc is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078096" version="1" comment="libreoffice-writer is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078098" version="1" comment="libreoffice-writer-extensions is &lt;3.5.4.13-1.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078099" version="1" comment="libotr is &lt;3.2.1-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078101" version="1" comment="libotr-devel is &lt;3.2.1-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078102" version="1" comment="libotr-tools is &lt;3.2.1-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078104" version="1" comment="libotr2 is &lt;3.2.1-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078106" version="1" comment="hyper-v is &lt;4-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078109" version="1" comment="wireshark is &lt;1.8.4-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078112" version="1" comment="wireshark-devel is &lt;1.8.4-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078113" version="1" comment="xen is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078115" version="1" comment="xen-devel is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078116" version="1" comment="xen-kmp-default is &lt;4.1.3_04_k3.4.11_2.16-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078118" version="1" comment="xen-kmp-desktop is &lt;4.1.3_04_k3.4.11_2.16-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078120" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_k3.4.11_2.16-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078122" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078123" version="1" comment="xen-libs is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078126" version="1" comment="xen-tools-domU is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078128" version="1" comment="xen-doc-html is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078129" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078130" version="1" comment="xen-tools is &lt;4.1.3_04-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078132" version="1" comment="icedtea-web is &lt;1.3.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078135" version="1" comment="icedtea-web-javadoc is &lt;1.3.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078136" version="1" comment="kdelibs4-apidocs is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078137" version="1" comment="kdelibs4 is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078138" version="1" comment="kdelibs4-branding-upstream is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078139" version="1" comment="kdelibs4-core is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078143" version="1" comment="kdelibs4-doc is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078145" version="1" comment="libkde4-32bit is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078146" version="1" comment="libkde4 is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078149" version="1" comment="libkde4-devel is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078150" version="1" comment="libkdecore4-32bit is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078151" version="1" comment="libkdecore4 is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078154" version="1" comment="libkdecore4-devel is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078156" version="1" comment="libksuseinstall-devel is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078157" version="1" comment="libksuseinstall1-32bit is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078158" version="1" comment="libksuseinstall1 is &lt;4.8.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078161" version="1" comment="weechat is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078162" version="1" comment="weechat-aspell is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078166" version="1" comment="weechat-devel is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078167" version="1" comment="weechat-guile is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078169" version="1" comment="weechat-lang is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078170" version="1" comment="weechat-lua is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078172" version="1" comment="weechat-perl is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078174" version="1" comment="weechat-python is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078176" version="1" comment="weechat-ruby is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078178" version="1" comment="weechat-tcl is &lt;0.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078180" version="1" comment="MozillaFirefox is &lt;17.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078181" version="1" comment="MozillaFirefox-branding-upstream is &lt;17.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078182" version="1" comment="MozillaFirefox-buildsymbols is &lt;17.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078185" version="1" comment="MozillaFirefox-devel is &lt;17.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078186" version="1" comment="MozillaFirefox-translations-common is &lt;17.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078187" version="1" comment="MozillaFirefox-translations-other is &lt;17.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078188" version="1" comment="MozillaThunderbird is &lt;17.0-49.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078189" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0-49.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078192" version="1" comment="MozillaThunderbird-devel is &lt;17.0-49.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078194" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0-49.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078195" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0-49.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078196" version="1" comment="enigmail is &lt;1.4.6+17.0-49.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078198" version="1" comment="mozilla-js is &lt;17.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078199" version="1" comment="mozilla-js-32bit is &lt;17.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078202" version="1" comment="xulrunner is &lt;17.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078203" version="1" comment="xulrunner-32bit is &lt;17.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078204" version="1" comment="xulrunner-buildsymbols is &lt;17.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078208" version="1" comment="xulrunner-devel is &lt;17.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078210" version="1" comment="seamonkey is &lt;2.14-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078213" version="1" comment="seamonkey-dom-inspector is &lt;2.14-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078214" version="1" comment="seamonkey-irc is &lt;2.14-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078215" version="1" comment="seamonkey-translations-common is &lt;2.14-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078216" version="1" comment="seamonkey-translations-other is &lt;2.14-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078217" version="1" comment="seamonkey-venkman is &lt;2.14-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078218" version="1" comment="lighttpd is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078221" version="1" comment="lighttpd-mod_cml is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078223" version="1" comment="lighttpd-mod_geoip is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078225" version="1" comment="lighttpd-mod_magnet is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078227" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078229" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078231" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078233" version="1" comment="lighttpd-mod_webdav is &lt;1.4.31-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078235" version="1" comment="libssh is &lt;0.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078237" version="1" comment="libssh-devel is &lt;0.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078238" version="1" comment="libssh-devel-doc is &lt;0.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078239" version="1" comment="libssh4 is &lt;0.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078241" version="1" comment="sblim-cim-client2 is &lt;2.1.12-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078242" version="1" comment="sblim-cim-client2-javadoc is &lt;2.1.12-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078243" version="1" comment="sblim-cim-client2-manual is &lt;2.1.12-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078244" version="1" comment="horde4-imp is &lt;5.0.24-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078245" version="1" comment="gegl is &lt;0.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078246" version="1" comment="gegl-0_2 is &lt;0.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078248" version="1" comment="gegl-0_2-lang is &lt;0.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078251" version="1" comment="gegl-devel is &lt;0.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078252" version="1" comment="gegl-doc is &lt;0.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078253" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078255" version="1" comment="horde4-kronolith is &lt;3.0.18-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078256" version="1" comment="gimp is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078257" version="1" comment="gimp-branding-upstream is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078260" version="1" comment="gimp-devel is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078262" version="1" comment="gimp-help-browser is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078264" version="1" comment="gimp-lang is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078265" version="1" comment="gimp-plugins-python is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078267" version="1" comment="libgimp-2_0-0 is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078268" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078271" version="1" comment="libgimpui-2_0-0 is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078272" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.0-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078275" version="1" comment="tor is &lt;0.2.2.39-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078278" version="1" comment="chromedriver is &lt;25.0.1343.0-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078280" version="1" comment="chromium is &lt;25.0.1343.0-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078283" version="1" comment="chromium-desktop-gnome is &lt;25.0.1343.0-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078284" version="1" comment="chromium-desktop-kde is &lt;25.0.1343.0-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078285" version="1" comment="chromium-ffmpegsumo is &lt;25.0.1343.0-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078287" version="1" comment="chromium-suid-helper is &lt;25.0.1343.0-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078289" version="1" comment="bogofilter is &lt;1.2.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078292" version="1" comment="libxml2-2 is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078293" version="1" comment="libxml2-2-32bit is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078296" version="1" comment="libxml2 is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078298" version="1" comment="libxml2-devel is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078299" version="1" comment="libxml2-devel-32bit is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078300" version="1" comment="libxml2-doc is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078301" version="1" comment="libxml2-tools is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078303" version="1" comment="python-libxml2 is &lt;2.7.8+git20120223-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078306" version="1" comment="xen is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078308" version="1" comment="xen-devel is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078309" version="1" comment="xen-kmp-default is &lt;4.1.3_06_k3.4.11_2.16-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078311" version="1" comment="xen-kmp-desktop is &lt;4.1.3_06_k3.4.11_2.16-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078313" version="1" comment="xen-kmp-pae is &lt;4.1.3_06_k3.4.11_2.16-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078315" version="1" comment="xen-libs-32bit is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078316" version="1" comment="xen-libs is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078319" version="1" comment="xen-tools-domU is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078321" version="1" comment="xen-doc-html is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078322" version="1" comment="xen-doc-pdf is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078323" version="1" comment="xen-tools is &lt;4.1.3_06-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078325" version="1" comment="bind is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078326" version="1" comment="bind-chrootenv is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078329" version="1" comment="bind-devel is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078330" version="1" comment="bind-doc is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078331" version="1" comment="bind-libs-32bit is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078332" version="1" comment="bind-libs is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078335" version="1" comment="bind-lwresd is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078337" version="1" comment="bind-utils is &lt;9.9.2P1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078339" version="1" comment="chromedriver is &lt;25.0.1362.0-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078341" version="1" comment="chromium is &lt;25.0.1362.0-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078344" version="1" comment="chromium-desktop-gnome is &lt;25.0.1362.0-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078345" version="1" comment="chromium-desktop-kde is &lt;25.0.1362.0-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078346" version="1" comment="chromium-ffmpegsumo is &lt;25.0.1362.0-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078348" version="1" comment="chromium-suid-helper is &lt;25.0.1362.0-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078350" version="1" comment="tomcat is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078351" version="1" comment="tomcat-admin-webapps is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078352" version="1" comment="tomcat-docs-webapp is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078353" version="1" comment="tomcat-el-2_2-api is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078354" version="1" comment="tomcat-javadoc is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078355" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078356" version="1" comment="tomcat-jsvc is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078357" version="1" comment="tomcat-lib is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078358" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078359" version="1" comment="tomcat-webapps is &lt;7.0.27-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078360" version="1" comment="libmysqlclient-devel is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078361" version="1" comment="libmysqlclient18-32bit is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078362" version="1" comment="libmysqlclient18 is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078365" version="1" comment="libmysqlclient_r18-32bit is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078366" version="1" comment="libmysqlclient_r18 is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078367" version="1" comment="libmysqld-devel is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078368" version="1" comment="libmysqld18 is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078370" version="1" comment="mysql-community-server is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078371" version="1" comment="mysql-community-server-bench is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078373" version="1" comment="mysql-community-server-client is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078375" version="1" comment="mysql-community-server-debug-version is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078379" version="1" comment="mysql-community-server-errormessages is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078380" version="1" comment="mysql-community-server-test is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078382" version="1" comment="mysql-community-server-tools is &lt;5.5.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078384" version="1" comment="libmariadbclient18-32bit is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078385" version="1" comment="libmariadbclient18 is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078388" version="1" comment="libmariadbclient_r18-32bit is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078389" version="1" comment="libmariadbclient_r18 is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078390" version="1" comment="mariadb is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078391" version="1" comment="mariadb-bench is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078393" version="1" comment="mariadb-client is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078395" version="1" comment="mariadb-debug-version is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078399" version="1" comment="mariadb-errormessages is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078400" version="1" comment="mariadb-test is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078402" version="1" comment="mariadb-tools is &lt;5.5.28a-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078404" version="1" comment="libqt4-devel-doc is &lt;4.8.1-2.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078405" version="1" comment="libqt4-devel-doc-data is &lt;4.8.1-2.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078408" version="1" comment="qt4-x11-tools is &lt;4.8.1-2.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078410" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078411" version="1" comment="libqt4-sql-mysql is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078414" version="1" comment="libqt4-sql-plugins is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078416" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078417" version="1" comment="libqt4-sql-postgresql is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078420" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078421" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078424" version="1" comment="libqt4-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078425" version="1" comment="libqt4 is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078429" version="1" comment="libqt4-devel is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078431" version="1" comment="libqt4-private-headers-devel is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078432" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078433" version="1" comment="libqt4-qt3support is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078436" version="1" comment="libqt4-sql-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078437" version="1" comment="libqt4-sql is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078440" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078441" version="1" comment="libqt4-sql-sqlite is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078444" version="1" comment="libqt4-x11-32bit is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078445" version="1" comment="libqt4-x11 is &lt;4.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078448" version="1" comment="tomcat is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078449" version="1" comment="tomcat-admin-webapps is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078450" version="1" comment="tomcat-docs-webapp is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078451" version="1" comment="tomcat-el-2_2-api is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078452" version="1" comment="tomcat-javadoc is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078453" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078454" version="1" comment="tomcat-jsvc is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078455" version="1" comment="tomcat-lib is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078456" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078457" version="1" comment="tomcat-webapps is &lt;7.0.27-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078458" version="1" comment="MozillaFirefox is &lt;18.0-2.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078459" version="1" comment="MozillaFirefox-branding-upstream is &lt;18.0-2.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078460" version="1" comment="MozillaFirefox-buildsymbols is &lt;18.0-2.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078463" version="1" comment="MozillaFirefox-devel is &lt;18.0-2.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078464" version="1" comment="MozillaFirefox-translations-common is &lt;18.0-2.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078465" version="1" comment="MozillaFirefox-translations-other is &lt;18.0-2.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078466" version="1" comment="MozillaThunderbird is &lt;17.0.2-49.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078467" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.2-49.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078470" version="1" comment="MozillaThunderbird-devel is &lt;17.0.2-49.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078472" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.2-49.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078473" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.2-49.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078474" version="1" comment="enigmail is &lt;1.5.0+17.0.2-49.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078476" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078477" version="1" comment="mozilla-nspr is &lt;4.9.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078481" version="1" comment="mozilla-nspr-devel is &lt;4.9.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078482" version="1" comment="libfreebl3 is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078483" version="1" comment="libfreebl3-32bit is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078486" version="1" comment="libsoftokn3 is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078487" version="1" comment="libsoftokn3-32bit is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078490" version="1" comment="mozilla-nss is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078491" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078492" version="1" comment="mozilla-nss-certs is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078493" version="1" comment="mozilla-nss-certs-32bit is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078499" version="1" comment="mozilla-nss-devel is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078500" version="1" comment="mozilla-nss-sysinit is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078501" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078504" version="1" comment="mozilla-nss-tools is &lt;3.14.1-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078506" version="1" comment="seamonkey is &lt;2.15-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078509" version="1" comment="seamonkey-dom-inspector is &lt;2.15-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078510" version="1" comment="seamonkey-irc is &lt;2.15-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078511" version="1" comment="seamonkey-translations-common is &lt;2.15-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078512" version="1" comment="seamonkey-translations-other is &lt;2.15-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078513" version="1" comment="seamonkey-venkman is &lt;2.15-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078514" version="1" comment="mozilla-js is &lt;17.0.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078515" version="1" comment="mozilla-js-32bit is &lt;17.0.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078518" version="1" comment="xulrunner is &lt;17.0.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078519" version="1" comment="xulrunner-32bit is &lt;17.0.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078520" version="1" comment="xulrunner-buildsymbols is &lt;17.0.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078524" version="1" comment="xulrunner-devel is &lt;17.0.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078526" version="1" comment="freeradius-server is &lt;2.1.12-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078529" version="1" comment="freeradius-server-devel is &lt;2.1.12-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078530" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.12-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078531" version="1" comment="freeradius-server-doc is &lt;2.1.12-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078532" version="1" comment="freeradius-server-libs is &lt;2.1.12-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078534" version="1" comment="freeradius-server-utils is &lt;2.1.12-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078536" version="1" comment="freetype2 is &lt;2.4.9-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078538" version="1" comment="freetype2-devel is &lt;2.4.9-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078539" version="1" comment="freetype2-devel-32bit is &lt;2.4.9-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078540" version="1" comment="libfreetype6 is &lt;2.4.9-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078541" version="1" comment="libfreetype6-32bit is &lt;2.4.9-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078544" version="1" comment="ft2demos is &lt;2.4.9-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078547" version="1" comment="nagios is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078550" version="1" comment="nagios-devel is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078551" version="1" comment="nagios-www is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078553" version="1" comment="icinga is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078556" version="1" comment="icinga-devel is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078557" version="1" comment="icinga-doc is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078558" version="1" comment="icinga-idoutils is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078560" version="1" comment="icinga-idoutils-mysql is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078561" version="1" comment="icinga-idoutils-oracle is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078562" version="1" comment="icinga-idoutils-pgsql is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078563" version="1" comment="icinga-plugins-downtimes is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078564" version="1" comment="icinga-plugins-eventhandlers is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078565" version="1" comment="icinga-www is &lt;1.7.4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078567" version="1" comment="squid3 is &lt;3.1.23-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078570" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078573" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078575" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078577" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078578" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078579" version="1" comment="cron is &lt;4.2-37.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078580" version="1" comment="cronie is &lt;1.4.8-37.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078581" version="1" comment="cronie-anacron is &lt;1.4.8-37.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078585" version="1" comment="chromedriver is &lt;26.0.1383.0-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078587" version="1" comment="chromium is &lt;26.0.1383.0-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078590" version="1" comment="chromium-desktop-gnome is &lt;26.0.1383.0-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078591" version="1" comment="chromium-desktop-kde is &lt;26.0.1383.0-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078592" version="1" comment="chromium-ffmpegsumo is &lt;26.0.1383.0-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078594" version="1" comment="chromium-suid-helper is &lt;26.0.1383.0-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078596" version="1" comment="python-virtualbox is &lt;4.1.22-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078598" version="1" comment="virtualbox is &lt;4.1.22-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078601" version="1" comment="virtualbox-devel is &lt;4.1.22-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078602" version="1" comment="virtualbox-guest-kmp-default is &lt;4.1.22_k3.4.11_2.16-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078604" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.1.22_k3.4.11_2.16-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078606" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.1.22_k3.4.11_2.16-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078608" version="1" comment="virtualbox-guest-tools is &lt;4.1.22-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078610" version="1" comment="virtualbox-guest-x11 is &lt;4.1.22-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078612" version="1" comment="virtualbox-host-kmp-default is &lt;4.1.22_k3.4.11_2.16-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078614" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.1.22_k3.4.11_2.16-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078616" version="1" comment="virtualbox-host-kmp-pae is &lt;4.1.22_k3.4.11_2.16-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078618" version="1" comment="virtualbox-qt is &lt;4.1.22-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078620" version="1" comment="virtualbox-websrv is &lt;4.1.22-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078622" version="1" comment="coreutils is &lt;8.16-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078625" version="1" comment="coreutils-lang is &lt;8.16-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078626" version="1" comment="libv8-3 is &lt;3.16.4.0-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078628" version="1" comment="v8 is &lt;3.16.4.0-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078629" version="1" comment="v8-devel is &lt;3.16.4.0-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078630" version="1" comment="v8-private-headers-devel is &lt;3.16.4.0-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078631" version="1" comment="apache2 is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078634" version="1" comment="apache2-devel is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078635" version="1" comment="apache2-doc is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078636" version="1" comment="apache2-event is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078638" version="1" comment="apache2-example-pages is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078639" version="1" comment="apache2-itk is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078641" version="1" comment="apache2-prefork is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078643" version="1" comment="apache2-utils is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078645" version="1" comment="apache2-worker is &lt;2.2.22-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078647" version="1" comment="libqt4-devel-doc is &lt;4.8.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078648" version="1" comment="libqt4-devel-doc-data is &lt;4.8.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078651" version="1" comment="qt4-x11-tools is &lt;4.8.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078653" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078654" version="1" comment="libqt4-sql-mysql is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078657" version="1" comment="libqt4-sql-plugins is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078659" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078660" version="1" comment="libqt4-sql-postgresql is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078663" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078664" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078667" version="1" comment="libqt4-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078668" version="1" comment="libqt4 is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078672" version="1" comment="libqt4-devel is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078674" version="1" comment="libqt4-private-headers-devel is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078675" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078676" version="1" comment="libqt4-qt3support is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078679" version="1" comment="libqt4-sql-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078680" version="1" comment="libqt4-sql is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078683" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078684" version="1" comment="libqt4-sql-sqlite is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078687" version="1" comment="libqt4-x11-32bit is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078688" version="1" comment="libqt4-x11 is &lt;4.8.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078691" version="1" comment="qt4-qtscript is &lt;0.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078693" version="1" comment="qt4-qtscript-doc is &lt;0.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078694" version="1" comment="libupnp is &lt;1.6.18-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078696" version="1" comment="libupnp-devel is &lt;1.6.18-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078697" version="1" comment="libupnp6 is &lt;1.6.18-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078698" version="1" comment="libupnp6-32bit is &lt;1.6.18-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078701" version="1" comment="wireshark is &lt;1.8.5-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078704" version="1" comment="wireshark-devel is &lt;1.8.5-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078705" version="1" comment="rubygem-actionmailer-2_3 is &lt;2.3.16-2.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078706" version="1" comment="rubygem-actionmailer-2_3-doc is &lt;2.3.16-2.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078707" version="1" comment="rubygem-actionmailer-2_3-testsuite is &lt;2.3.16-2.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078708" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.11-2.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078709" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.11-2.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078710" version="1" comment="rubygem-actionmailer is &lt;2.3.16-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078711" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.16-2.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078712" version="1" comment="rubygem-actionpack-2_3-doc is &lt;2.3.16-2.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078713" version="1" comment="rubygem-actionpack-2_3-testsuite is &lt;2.3.16-2.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078714" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.11-3.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078715" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.11-3.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078716" version="1" comment="rubygem-actionpack is &lt;2.3.16-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078717" version="1" comment="rubygem-activemodel-3_2 is &lt;3.2.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078718" version="1" comment="rubygem-activemodel-3_2-doc is &lt;3.2.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078719" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.16-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078720" version="1" comment="rubygem-activerecord-2_3-doc is &lt;2.3.16-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078721" version="1" comment="rubygem-activerecord-2_3-testsuite is &lt;2.3.16-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078722" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078723" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078724" version="1" comment="rubygem-activerecord is &lt;2.3.16-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078725" version="1" comment="rubygem-activeresource-2_3 is &lt;2.3.16-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078726" version="1" comment="rubygem-activeresource-2_3-doc is &lt;2.3.16-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078727" version="1" comment="rubygem-activeresource-2_3-testsuite is &lt;2.3.16-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078728" version="1" comment="rubygem-activeresource-3_2 is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078729" version="1" comment="rubygem-activeresource-3_2-doc is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078730" version="1" comment="rubygem-activeresource is &lt;2.3.16-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078731" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.16-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078732" version="1" comment="rubygem-activesupport-2_3-doc is &lt;2.3.16-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078733" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078734" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078735" version="1" comment="rubygem-activesupport is &lt;2.3.16-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078736" version="1" comment="rubygem-rack-1_1 is &lt;1.1.5-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078737" version="1" comment="rubygem-rack-1_1-doc is &lt;1.1.5-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078738" version="1" comment="rubygem-rack-1_1-testsuite is &lt;1.1.5-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078739" version="1" comment="rubygem-rack-1_2 is &lt;1.2.7-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078740" version="1" comment="rubygem-rack-1_2-doc is &lt;1.2.7-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078741" version="1" comment="rubygem-rack-1_2-testsuite is &lt;1.2.7-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078742" version="1" comment="rubygem-rack-1_3 is &lt;1.3.9-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078743" version="1" comment="rubygem-rack-1_3-doc is &lt;1.3.9-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078744" version="1" comment="rubygem-rack-1_3-testsuite is &lt;1.3.9-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078745" version="1" comment="rubygem-rack-1_4 is &lt;1.4.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078746" version="1" comment="rubygem-rack-1_4-doc is &lt;1.4.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078747" version="1" comment="rubygem-rack-1_4-testsuite is &lt;1.4.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078748" version="1" comment="rubygem-rails-2_3 is &lt;2.3.16-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078749" version="1" comment="rubygem-rails-2_3-doc is &lt;2.3.16-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078750" version="1" comment="rubygem-rails-3_2 is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078751" version="1" comment="rubygem-rails-3_2-doc is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078752" version="1" comment="rubygem-rails is &lt;2.3.16-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078753" version="1" comment="rubygem-railties-3_2 is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078754" version="1" comment="rubygem-railties-3_2-doc is &lt;3.2.11-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078755" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078756" version="1" comment="rubygem-sprockets-2_2-doc is &lt;2.2.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078757" version="1" comment="samba-doc is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078758" version="1" comment="ldapsmb is &lt;1.34b-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078759" version="1" comment="libnetapi-devel is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078760" version="1" comment="libnetapi0 is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078762" version="1" comment="libsmbclient-devel is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078763" version="1" comment="libsmbclient0 is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078764" version="1" comment="libsmbclient0-32bit is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078767" version="1" comment="libsmbsharemodes-devel is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078768" version="1" comment="libsmbsharemodes0 is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078770" version="1" comment="libwbclient-devel is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078771" version="1" comment="libwbclient0 is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078772" version="1" comment="libwbclient0-32bit is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078775" version="1" comment="samba is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078776" version="1" comment="samba-32bit is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078777" version="1" comment="samba-client is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078778" version="1" comment="samba-client-32bit is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078784" version="1" comment="samba-devel is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078785" version="1" comment="samba-krb-printing is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078787" version="1" comment="samba-winbind is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078788" version="1" comment="samba-winbind-32bit is &lt;3.6.7-48.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078791" version="1" comment="libvirt is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078792" version="1" comment="libvirt-client is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078793" version="1" comment="libvirt-client-32bit is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078798" version="1" comment="libvirt-devel is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078799" version="1" comment="libvirt-devel-32bit is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078800" version="1" comment="libvirt-doc is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078801" version="1" comment="libvirt-lock-sanlock is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078803" version="1" comment="libvirt-python is &lt;0.9.11.9-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078805" version="1" comment="inkscape is &lt;0.48.3.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078808" version="1" comment="inkscape-extensions-dia is &lt;0.48.3.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078809" version="1" comment="inkscape-extensions-extra is &lt;0.48.3.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078810" version="1" comment="inkscape-extensions-fig is &lt;0.48.3.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078811" version="1" comment="inkscape-extensions-gimp is &lt;0.48.3.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078812" version="1" comment="inkscape-extensions-skencil is &lt;0.48.3.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078813" version="1" comment="inkscape-lang is &lt;0.48.3.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078814" version="1" comment="gnome-online-accounts is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078817" version="1" comment="gnome-online-accounts-devel is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078818" version="1" comment="gnome-online-accounts-lang is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078819" version="1" comment="libgoa-1_0-0 is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078820" version="1" comment="libgoa-1_0-0-32bit is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078823" version="1" comment="libgoa-backend-1_0-0 is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078824" version="1" comment="libgoa-backend-1_0-0-32bit is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078827" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.4.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078828" version="1" comment="blender is &lt;2.63a-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078830" version="1" comment="blender-lang is &lt;2.63a-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078831" version="1" comment="roundcubemail is &lt;0.8.5-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078832" version="1" comment="libecpg6-32bit is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078833" version="1" comment="libecpg6 is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078836" version="1" comment="libpq5-32bit is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078837" version="1" comment="libpq5 is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078840" version="1" comment="postgresql91-devel-32bit is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078841" version="1" comment="postgresql91-devel is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078844" version="1" comment="postgresql91-libs is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078846" version="1" comment="postgresql91 is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078847" version="1" comment="postgresql91-contrib is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078851" version="1" comment="postgresql91-docs is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078852" version="1" comment="postgresql91-plperl is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078854" version="1" comment="postgresql91-plpython is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078856" version="1" comment="postgresql91-pltcl is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078858" version="1" comment="postgresql91-server is &lt;9.1.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078860" version="1" comment="jakarta-commons-httpclient is &lt;3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078861" version="1" comment="jakarta-commons-httpclient-demo is &lt;3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078862" version="1" comment="jakarta-commons-httpclient-javadoc is &lt;3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078863" version="1" comment="jakarta-commons-httpclient-manual is &lt;3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078864" version="1" comment="rubygem-actionmailer-2_3 is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078865" version="1" comment="rubygem-actionmailer-2_3-doc is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078866" version="1" comment="rubygem-actionmailer-2_3-testsuite is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078867" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078868" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078869" version="1" comment="rubygem-actionmailer is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078870" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078871" version="1" comment="rubygem-actionpack-2_3-doc is &lt;2.3.17-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078872" version="1" comment="rubygem-actionpack-2_3-testsuite is &lt;2.3.17-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078873" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078874" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078875" version="1" comment="rubygem-actionpack is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078876" version="1" comment="rubygem-activemodel-3_2 is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078877" version="1" comment="rubygem-activemodel-3_2-doc is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078878" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078879" version="1" comment="rubygem-activerecord-2_3-doc is &lt;2.3.17-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078880" version="1" comment="rubygem-activerecord-2_3-testsuite is &lt;2.3.17-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078881" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078882" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078883" version="1" comment="rubygem-activerecord is &lt;2.3.17-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078884" version="1" comment="rubygem-activeresource-2_3 is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078885" version="1" comment="rubygem-activeresource-2_3-doc is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078886" version="1" comment="rubygem-activeresource-2_3-testsuite is &lt;2.3.17-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078887" version="1" comment="rubygem-activeresource-3_2 is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078888" version="1" comment="rubygem-activeresource-3_2-doc is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078889" version="1" comment="rubygem-activeresource is &lt;2.3.17-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078890" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078891" version="1" comment="rubygem-activesupport-2_3-doc is &lt;2.3.17-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078892" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078893" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078894" version="1" comment="rubygem-activesupport is &lt;2.3.17-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078895" version="1" comment="rubygem-rack-1_1 is &lt;1.1.6-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078896" version="1" comment="rubygem-rack-1_1-doc is &lt;1.1.6-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078897" version="1" comment="rubygem-rack-1_1-testsuite is &lt;1.1.6-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078898" version="1" comment="rubygem-rack-1_2 is &lt;1.2.8-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078899" version="1" comment="rubygem-rack-1_2-doc is &lt;1.2.8-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078900" version="1" comment="rubygem-rack-1_2-testsuite is &lt;1.2.8-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078901" version="1" comment="rubygem-rack-1_3 is &lt;1.3.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078902" version="1" comment="rubygem-rack-1_3-doc is &lt;1.3.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078903" version="1" comment="rubygem-rack-1_3-testsuite is &lt;1.3.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078904" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078905" version="1" comment="rubygem-rack-1_4-doc is &lt;1.4.5-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078906" version="1" comment="rubygem-rack-1_4-testsuite is &lt;1.4.5-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078907" version="1" comment="rubygem-rails-2_3 is &lt;2.3.17-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078908" version="1" comment="rubygem-rails-2_3-doc is &lt;2.3.17-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078909" version="1" comment="rubygem-rails-3_2 is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078910" version="1" comment="rubygem-rails-3_2-doc is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078911" version="1" comment="rubygem-rails is &lt;2.3.17-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078912" version="1" comment="rubygem-railties-3_2 is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078913" version="1" comment="rubygem-railties-3_2-doc is &lt;3.2.12-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078914" version="1" comment="rubygem-rdoc is &lt;3.12.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078915" version="1" comment="rubygem-rdoc-doc is &lt;3.12.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078916" version="1" comment="rubygem-rdoc-testsuite is &lt;3.12.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078917" version="1" comment="libopenssl-devel is &lt;1.0.1e-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078918" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078919" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078920" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078923" version="1" comment="openssl is &lt;1.0.1e-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078926" version="1" comment="openssl-doc is &lt;1.0.1e-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078927" version="1" comment="MozillaFirefox is &lt;19.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078928" version="1" comment="MozillaFirefox-branding-upstream is &lt;19.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078929" version="1" comment="MozillaFirefox-buildsymbols is &lt;19.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078932" version="1" comment="MozillaFirefox-devel is &lt;19.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078933" version="1" comment="MozillaFirefox-translations-common is &lt;19.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078934" version="1" comment="MozillaFirefox-translations-other is &lt;19.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078935" version="1" comment="MozillaThunderbird is &lt;17.0.3-49.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078936" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.3-49.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078939" version="1" comment="MozillaThunderbird-devel is &lt;17.0.3-49.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078941" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.3-49.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078942" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.3-49.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078943" version="1" comment="enigmail is &lt;1.5.1+17.0.3-49.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078945" version="1" comment="chmsee is &lt;2.0-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078948" version="1" comment="seamonkey is &lt;2.16-2.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078951" version="1" comment="seamonkey-dom-inspector is &lt;2.16-2.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078952" version="1" comment="seamonkey-irc is &lt;2.16-2.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078953" version="1" comment="seamonkey-translations-common is &lt;2.16-2.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078954" version="1" comment="seamonkey-translations-other is &lt;2.16-2.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078955" version="1" comment="seamonkey-venkman is &lt;2.16-2.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078956" version="1" comment="mozilla-js is &lt;17.0.3-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078957" version="1" comment="mozilla-js-32bit is &lt;17.0.3-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078960" version="1" comment="xulrunner is &lt;17.0.3-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078961" version="1" comment="xulrunner-32bit is &lt;17.0.3-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078962" version="1" comment="xulrunner-buildsymbols is &lt;17.0.3-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078966" version="1" comment="xulrunner-devel is &lt;17.0.3-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078968" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078971" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078973" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078975" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078976" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078977" version="1" comment="rubygem-devise is &lt;1.5.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078978" version="1" comment="rubygem-devise-doc is &lt;1.5.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078979" version="1" comment="rubygem-devise-testsuite is &lt;1.5.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078980" version="1" comment="ruby19 is &lt;1.9.3.p385-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078983" version="1" comment="ruby19-devel is &lt;1.9.3.p385-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078984" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p385-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078985" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p385-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078986" version="1" comment="ruby19-tk is &lt;1.9.3.p385-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078988" version="1" comment="PackageKit is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078989" version="1" comment="PackageKit-backend-zypp is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078991" version="1" comment="PackageKit-branding-upstream is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078992" version="1" comment="PackageKit-browser-plugin is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078996" version="1" comment="PackageKit-devel is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009078998" version="1" comment="PackageKit-gstreamer-plugin is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079000" version="1" comment="PackageKit-gtk3-module is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079002" version="1" comment="PackageKit-lang is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079003" version="1" comment="libpackagekit-glib2-14 is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079004" version="1" comment="libpackagekit-glib2-14-32bit is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079007" version="1" comment="libpackagekit-glib2-devel is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079008" version="1" comment="libpackagekit-glib2-devel-32bit is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079009" version="1" comment="libpackagekit-qt2-2 is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079010" version="1" comment="libpackagekit-qt2-2-32bit is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079013" version="1" comment="libpackagekit-qt2-devel is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079014" version="1" comment="libpackagekit-qt2-devel-32bit is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079015" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079016" version="1" comment="typelib-1_0-PackageKitPlugin-1_0 is &lt;0.7.4-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079017" version="1" comment="git is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079018" version="1" comment="git-arch is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079019" version="1" comment="git-core is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079021" version="1" comment="git-cvs is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079022" version="1" comment="git-daemon is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079025" version="1" comment="git-email is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079026" version="1" comment="git-gui is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079027" version="1" comment="git-remote-helpers is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079028" version="1" comment="git-svn is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079029" version="1" comment="git-web is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079030" version="1" comment="gitk is &lt;1.7.10.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079031" version="1" comment="libqt4-devel-doc is &lt;4.8.1-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079032" version="1" comment="libqt4-devel-doc-data is &lt;4.8.1-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079035" version="1" comment="qt4-x11-tools is &lt;4.8.1-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079037" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079038" version="1" comment="libqt4-sql-mysql is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079041" version="1" comment="libqt4-sql-plugins is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079043" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079044" version="1" comment="libqt4-sql-postgresql is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079047" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079048" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079051" version="1" comment="libqt4-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079052" version="1" comment="libqt4 is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079056" version="1" comment="libqt4-devel is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079058" version="1" comment="libqt4-private-headers-devel is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079059" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079060" version="1" comment="libqt4-qt3support is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079063" version="1" comment="libqt4-sql-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079064" version="1" comment="libqt4-sql is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079067" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079068" version="1" comment="libqt4-sql-sqlite is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079071" version="1" comment="libqt4-x11-32bit is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079072" version="1" comment="libqt4-x11 is &lt;4.8.1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079075" version="1" comment="finch is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079077" version="1" comment="finch-devel is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079078" version="1" comment="libpurple is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079079" version="1" comment="libpurple-branding-upstream is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079081" version="1" comment="libpurple-devel is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079082" version="1" comment="libpurple-lang is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079083" version="1" comment="libpurple-meanwhile is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079085" version="1" comment="libpurple-tcl is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079087" version="1" comment="pidgin is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079090" version="1" comment="pidgin-devel is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079091" version="1" comment="pidgin-evolution is &lt;2.10.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079093" version="1" comment="kernel-debug is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079094" version="1" comment="kernel-debug-base is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079098" version="1" comment="kernel-debug-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079100" version="1" comment="kernel-default is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079101" version="1" comment="kernel-default-base is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079105" version="1" comment="kernel-default-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079107" version="1" comment="kernel-desktop is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079108" version="1" comment="kernel-desktop-base is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079112" version="1" comment="kernel-desktop-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079114" version="1" comment="kernel-docs is &lt;3.4.33-2.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079115" version="1" comment="kernel-ec2 is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079116" version="1" comment="kernel-ec2-base is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079120" version="1" comment="kernel-ec2-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079122" version="1" comment="kernel-ec2-extra is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079124" version="1" comment="kernel-pae is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079125" version="1" comment="kernel-pae-base is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079129" version="1" comment="kernel-pae-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079131" version="1" comment="kernel-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079132" version="1" comment="kernel-source is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079133" version="1" comment="kernel-source-vanilla is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079134" version="1" comment="kernel-syms is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079135" version="1" comment="kernel-trace is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079136" version="1" comment="kernel-trace-base is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079140" version="1" comment="kernel-trace-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079142" version="1" comment="kernel-vanilla is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079145" version="1" comment="kernel-vanilla-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079147" version="1" comment="kernel-xen is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079148" version="1" comment="kernel-xen-base is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079152" version="1" comment="kernel-xen-devel is &lt;3.4.33-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079154" version="1" comment="sudo is &lt;1.8.5p2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079157" version="1" comment="sudo-devel is &lt;1.8.5p2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079158" version="1" comment="firebird-classic is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079161" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079162" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079164" version="1" comment="firebird is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079165" version="1" comment="firebird-32bit is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079169" version="1" comment="firebird-devel is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079170" version="1" comment="firebird-doc is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079171" version="1" comment="firebird-superserver is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079173" version="1" comment="libfbclient2 is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079174" version="1" comment="libfbclient2-32bit is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079177" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079178" version="1" comment="wireshark is &lt;1.8.6-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079181" version="1" comment="wireshark-devel is &lt;1.8.6-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079182" version="1" comment="chromedriver is &lt;27.0.1425.0-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079184" version="1" comment="chromium is &lt;27.0.1425.0-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079187" version="1" comment="chromium-desktop-gnome is &lt;27.0.1425.0-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079188" version="1" comment="chromium-desktop-kde is &lt;27.0.1425.0-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079189" version="1" comment="chromium-ffmpegsumo is &lt;27.0.1425.0-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079191" version="1" comment="chromium-suid-helper is &lt;27.0.1425.0-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079193" version="1" comment="MozillaFirefox is &lt;19.0.2-2.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079194" version="1" comment="MozillaFirefox-branding-upstream is &lt;19.0.2-2.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079195" version="1" comment="MozillaFirefox-buildsymbols is &lt;19.0.2-2.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079198" version="1" comment="MozillaFirefox-devel is &lt;19.0.2-2.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079199" version="1" comment="MozillaFirefox-translations-common is &lt;19.0.2-2.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079200" version="1" comment="MozillaFirefox-translations-other is &lt;19.0.2-2.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079201" version="1" comment="krb5-doc is &lt;1.10.2-3.12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079202" version="1" comment="krb5-mini is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079205" version="1" comment="krb5-mini-devel is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079206" version="1" comment="krb5 is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079207" version="1" comment="krb5-32bit is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079208" version="1" comment="krb5-client is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079213" version="1" comment="krb5-devel is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079214" version="1" comment="krb5-devel-32bit is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079215" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079217" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079219" version="1" comment="krb5-server is &lt;1.10.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079221" version="1" comment="systemtap-docs is &lt;1.7-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079222" version="1" comment="systemtap is &lt;1.7-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079225" version="1" comment="systemtap-runtime is &lt;1.7-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079227" version="1" comment="systemtap-sdt-devel is &lt;1.7-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079228" version="1" comment="systemtap-server is &lt;1.7-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079230" version="1" comment="mozilla-js is &lt;17.0.4-2.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079231" version="1" comment="mozilla-js-32bit is &lt;17.0.4-2.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079234" version="1" comment="xulrunner is &lt;17.0.4-2.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079235" version="1" comment="xulrunner-32bit is &lt;17.0.4-2.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079236" version="1" comment="xulrunner-buildsymbols is &lt;17.0.4-2.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079240" version="1" comment="xulrunner-devel is &lt;17.0.4-2.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079242" version="1" comment="seamonkey is &lt;2.16.1-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079245" version="1" comment="seamonkey-dom-inspector is &lt;2.16.1-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079246" version="1" comment="seamonkey-irc is &lt;2.16.1-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079247" version="1" comment="seamonkey-translations-common is &lt;2.16.1-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079248" version="1" comment="seamonkey-translations-other is &lt;2.16.1-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079249" version="1" comment="seamonkey-venkman is &lt;2.16.1-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079250" version="1" comment="nagios-nrpe is &lt;2.12-30.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079253" version="1" comment="nagios-nrpe-doc is &lt;2.12-30.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079254" version="1" comment="nagios-plugins-nrpe is &lt;2.12-30.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079256" version="1" comment="perl-32bit is &lt;5.16.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079257" version="1" comment="perl is &lt;5.16.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079258" version="1" comment="perl-base-32bit is &lt;5.16.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079259" version="1" comment="perl-base is &lt;5.16.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079265" version="1" comment="perl-doc is &lt;5.16.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079266" version="1" comment="MozillaThunderbird is &lt;17.0.4-49.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079267" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.4-49.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079270" version="1" comment="MozillaThunderbird-devel is &lt;17.0.4-49.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079272" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.4-49.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079273" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.4-49.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079274" version="1" comment="enigmail is &lt;1.5.1+17.0.4-49.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079276" version="1" comment="transmission is &lt;2.60-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079277" version="1" comment="transmission-common is &lt;2.60-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079280" version="1" comment="transmission-gtk is &lt;2.60-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079282" version="1" comment="transmission-gtk-lang is &lt;2.60-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079283" version="1" comment="transmission-qt is &lt;2.60-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079285" version="1" comment="nss-pam-ldapd is &lt;0.7.13-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079286" version="1" comment="nss-pam-ldapd-32bit is &lt;0.7.13-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079290" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079293" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079295" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079297" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079298" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079299" version="1" comment="telepathy-gabble is &lt;0.16.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079302" version="1" comment="telepathy-gabble-xmpp-console is &lt;0.16.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079304" version="1" comment="libxml2-2 is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079305" version="1" comment="libxml2-2-32bit is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079308" version="1" comment="libxml2 is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079310" version="1" comment="libxml2-devel is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079311" version="1" comment="libxml2-devel-32bit is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079312" version="1" comment="libxml2-doc is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079313" version="1" comment="libxml2-tools is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079315" version="1" comment="python-libxml2 is &lt;2.7.8+git20120223-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079318" version="1" comment="privoxy is &lt;3.0.21-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079321" version="1" comment="privoxy-doc is &lt;3.0.21-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079322" version="1" comment="ImageMagick is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079325" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079326" version="1" comment="ImageMagick-devel is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079327" version="1" comment="ImageMagick-doc is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079328" version="1" comment="ImageMagick-extra is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079330" version="1" comment="libMagick++-devel is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079331" version="1" comment="libMagick++5 is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079333" version="1" comment="libMagickCore5-32bit is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079334" version="1" comment="libMagickCore5 is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079337" version="1" comment="libMagickWand5-32bit is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079338" version="1" comment="libMagickWand5 is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079341" version="1" comment="perl-PerlMagick is &lt;6.7.6.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079343" version="1" comment="GraphicsMagick is &lt;1.3.15-14.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079346" version="1" comment="GraphicsMagick-devel is &lt;1.3.15-14.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079347" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.15-14.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079348" version="1" comment="libGraphicsMagick++3 is &lt;1.3.15-14.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079350" version="1" comment="libGraphicsMagick3 is &lt;1.3.15-14.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079352" version="1" comment="libGraphicsMagickWand2 is &lt;1.3.15-14.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079354" version="1" comment="perl-GraphicsMagick is &lt;1.3.15-14.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079356" version="1" comment="pigz is &lt;2.1.6-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079359" version="1" comment="clamav is &lt;0.97.7-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079360" version="1" comment="clamav-db is &lt;0.97.7-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079363" version="1" comment="ruby is &lt;1.9.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079364" version="1" comment="ruby-common is &lt;1.9.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079365" version="1" comment="ruby-devel is &lt;1.9.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079366" version="1" comment="ruby19 is &lt;1.9.3.p392-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079369" version="1" comment="ruby19-devel is &lt;1.9.3.p392-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079370" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079371" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079372" version="1" comment="ruby19-tk is &lt;1.9.3.p392-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079374" version="1" comment="fail2ban is &lt;0.8.6-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079375" version="1" comment="libxslt-python is &lt;1.1.26-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079378" version="1" comment="libxslt is &lt;1.1.26-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079380" version="1" comment="libxslt-devel is &lt;1.1.26-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079381" version="1" comment="libxslt-devel-32bit is &lt;1.1.26-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079382" version="1" comment="libxslt-tools is &lt;1.1.26-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079384" version="1" comment="libxslt1 is &lt;1.1.26-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079385" version="1" comment="libxslt1-32bit is &lt;1.1.26-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079388" version="1" comment="puppet is &lt;2.7.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079389" version="1" comment="puppet-server is &lt;2.7.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079390" version="1" comment="bind is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079391" version="1" comment="bind-chrootenv is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079394" version="1" comment="bind-devel is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079395" version="1" comment="bind-doc is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079396" version="1" comment="bind-libs-32bit is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079397" version="1" comment="bind-libs is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079400" version="1" comment="bind-lwresd is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079402" version="1" comment="bind-utils is &lt;9.9.2P2-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079404" version="1" comment="dhcp is &lt;4.2.4.P2-0.1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079405" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079409" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079410" version="1" comment="dhcp-doc is &lt;4.2.4.P2-0.1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079411" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079413" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079415" version="1" comment="jakarta-commons-httpclient is &lt;3.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079416" version="1" comment="jakarta-commons-httpclient-demo is &lt;3.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079417" version="1" comment="jakarta-commons-httpclient-javadoc is &lt;3.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079418" version="1" comment="jakarta-commons-httpclient-manual is &lt;3.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079419" version="1" comment="apache2 is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079422" version="1" comment="apache2-devel is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079423" version="1" comment="apache2-doc is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079424" version="1" comment="apache2-event is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079426" version="1" comment="apache2-example-pages is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079427" version="1" comment="apache2-itk is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079429" version="1" comment="apache2-prefork is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079431" version="1" comment="apache2-utils is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079433" version="1" comment="apache2-worker is &lt;2.2.22-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079435" version="1" comment="xen is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079437" version="1" comment="xen-devel is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079438" version="1" comment="xen-kmp-default is &lt;4.1.4_02_k3.4.33_2.24-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079440" version="1" comment="xen-kmp-desktop is &lt;4.1.4_02_k3.4.33_2.24-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079442" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_k3.4.33_2.24-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079444" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079445" version="1" comment="xen-libs is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079448" version="1" comment="xen-tools-domU is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079450" version="1" comment="xen-doc-html is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079451" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079452" version="1" comment="xen-tools is &lt;4.1.4_02-5.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079454" version="1" comment="roundcubemail is &lt;0.8.6-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079455" version="1" comment="MozillaFirefox is &lt;20.0-2.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079456" version="1" comment="MozillaFirefox-branding-upstream is &lt;20.0-2.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079457" version="1" comment="MozillaFirefox-buildsymbols is &lt;20.0-2.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079460" version="1" comment="MozillaFirefox-devel is &lt;20.0-2.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079461" version="1" comment="MozillaFirefox-translations-common is &lt;20.0-2.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079462" version="1" comment="MozillaFirefox-translations-other is &lt;20.0-2.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079463" version="1" comment="MozillaThunderbird is &lt;17.0.5-49.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079464" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.5-49.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079467" version="1" comment="MozillaThunderbird-devel is &lt;17.0.5-49.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079469" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.5-49.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079470" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.5-49.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079471" version="1" comment="enigmail is &lt;1.5.1+17.0.5-49.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079473" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079474" version="1" comment="mozilla-nspr is &lt;4.9.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079478" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079479" version="1" comment="libfreebl3 is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079480" version="1" comment="libfreebl3-32bit is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079483" version="1" comment="libsoftokn3 is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079484" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079487" version="1" comment="mozilla-nss is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079488" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079489" version="1" comment="mozilla-nss-certs is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079490" version="1" comment="mozilla-nss-certs-32bit is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079496" version="1" comment="mozilla-nss-devel is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079497" version="1" comment="mozilla-nss-sysinit is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079498" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079501" version="1" comment="mozilla-nss-tools is &lt;3.14.3-2.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079503" version="1" comment="mozilla-js is &lt;17.0.5-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079504" version="1" comment="mozilla-js-32bit is &lt;17.0.5-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079507" version="1" comment="xulrunner is &lt;17.0.5-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079508" version="1" comment="xulrunner-32bit is &lt;17.0.5-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079509" version="1" comment="xulrunner-buildsymbols is &lt;17.0.5-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079513" version="1" comment="xulrunner-devel is &lt;17.0.5-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079515" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079516" version="1" comment="rubygem-actionpack-2_3-doc is &lt;2.3.17-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079517" version="1" comment="rubygem-actionpack-2_3-testsuite is &lt;2.3.17-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079518" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079519" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079520" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079521" version="1" comment="rubygem-activerecord-2_3-doc is &lt;2.3.17-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079522" version="1" comment="rubygem-activerecord-2_3-testsuite is &lt;2.3.17-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079523" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079524" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.12-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079525" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079526" version="1" comment="rubygem-activesupport-2_3-doc is &lt;2.3.17-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079527" version="1" comment="libecpg6-32bit is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079528" version="1" comment="libecpg6 is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079531" version="1" comment="libpq5-32bit is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079532" version="1" comment="libpq5 is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079535" version="1" comment="postgresql91-devel-32bit is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079536" version="1" comment="postgresql91-devel is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079539" version="1" comment="postgresql91-libs is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079541" version="1" comment="postgresql91 is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079542" version="1" comment="postgresql91-contrib is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079546" version="1" comment="postgresql91-docs is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079547" version="1" comment="postgresql91-plperl is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079549" version="1" comment="postgresql91-plpython is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079551" version="1" comment="postgresql91-pltcl is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079553" version="1" comment="postgresql91-server is &lt;9.1.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079555" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079557" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079559" version="1" comment="subversion is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079560" version="1" comment="subversion-bash-completion is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079563" version="1" comment="subversion-devel is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079564" version="1" comment="subversion-perl is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079566" version="1" comment="subversion-python is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079568" version="1" comment="subversion-server is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079570" version="1" comment="subversion-tools is &lt;1.7.9-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079572" version="1" comment="curl is &lt;7.25.0-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079575" version="1" comment="libcurl-devel is &lt;7.25.0-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079576" version="1" comment="libcurl4-32bit is &lt;7.25.0-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079577" version="1" comment="libcurl4 is &lt;7.25.0-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079580" version="1" comment="Mesa-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079581" version="1" comment="Mesa is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079585" version="1" comment="Mesa-devel-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079586" version="1" comment="Mesa-devel is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079587" version="1" comment="Mesa-libEGL-devel-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079588" version="1" comment="Mesa-libEGL-devel is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079589" version="1" comment="Mesa-libEGL1-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079590" version="1" comment="Mesa-libEGL1 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079593" version="1" comment="Mesa-libGL-devel-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079594" version="1" comment="Mesa-libGL-devel is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079595" version="1" comment="Mesa-libGL1-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079596" version="1" comment="Mesa-libGL1 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079599" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079600" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079601" version="1" comment="Mesa-libGLESv1_CM1-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079602" version="1" comment="Mesa-libGLESv1_CM1 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079605" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079606" version="1" comment="Mesa-libGLESv2-2 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079609" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079610" version="1" comment="Mesa-libGLESv2-devel is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079611" version="1" comment="Mesa-libGLU-devel-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079612" version="1" comment="Mesa-libGLU-devel is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079613" version="1" comment="Mesa-libGLU1-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079614" version="1" comment="Mesa-libGLU1 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079617" version="1" comment="Mesa-libIndirectGL1-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079618" version="1" comment="Mesa-libIndirectGL1 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079621" version="1" comment="Mesa-libglapi0-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079622" version="1" comment="Mesa-libglapi0 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079625" version="1" comment="libOSMesa8-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079626" version="1" comment="libOSMesa8 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079629" version="1" comment="libXvMC_nouveau-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079630" version="1" comment="libXvMC_nouveau is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079633" version="1" comment="libXvMC_r300-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079634" version="1" comment="libXvMC_r300 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079637" version="1" comment="libXvMC_r600-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079638" version="1" comment="libXvMC_r600 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079641" version="1" comment="libXvMC_softpipe-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079642" version="1" comment="libXvMC_softpipe is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079645" version="1" comment="libgbm-devel is &lt;0.0.0-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079646" version="1" comment="libgbm-devel-32bit is &lt;0.0.0-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079647" version="1" comment="libgbm1 is &lt;0.0.0-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079648" version="1" comment="libgbm1-32bit is &lt;0.0.0-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079651" version="1" comment="libvdpau_nouveau-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079652" version="1" comment="libvdpau_nouveau is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079655" version="1" comment="libvdpau_r300-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079656" version="1" comment="libvdpau_r300 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079659" version="1" comment="libvdpau_r600-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079660" version="1" comment="libvdpau_r600 is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079663" version="1" comment="libvdpau_softpipe-32bit is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079664" version="1" comment="libvdpau_softpipe is &lt;8.0.4-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079667" version="1" comment="libxatracker-devel is &lt;1.0.0-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079668" version="1" comment="libxatracker1 is &lt;1.0.0-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079670" version="1" comment="icedtea-web is &lt;1.3.2-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079673" version="1" comment="icedtea-web-javadoc is &lt;1.3.2-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079674" version="1" comment="libxml2-2 is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079675" version="1" comment="libxml2-2-32bit is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079678" version="1" comment="libxml2 is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079680" version="1" comment="libxml2-devel is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079681" version="1" comment="libxml2-devel-32bit is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079682" version="1" comment="libxml2-doc is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079683" version="1" comment="libxml2-tools is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079685" version="1" comment="python-libxml2 is &lt;2.7.8+git20120223-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079688" version="1" comment="krb5-doc is &lt;1.10.2-3.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079689" version="1" comment="krb5-mini is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079692" version="1" comment="krb5-mini-devel is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079693" version="1" comment="krb5 is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079694" version="1" comment="krb5-32bit is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079695" version="1" comment="krb5-client is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079700" version="1" comment="krb5-devel is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079701" version="1" comment="krb5-devel-32bit is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079702" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079704" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079706" version="1" comment="krb5-server is &lt;1.10.2-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079708" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079711" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079713" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079715" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079716" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079717" version="1" comment="kernel-debug is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079718" version="1" comment="kernel-debug-base is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079722" version="1" comment="kernel-debug-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079724" version="1" comment="kernel-default is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079725" version="1" comment="kernel-default-base is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079729" version="1" comment="kernel-default-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079731" version="1" comment="kernel-desktop is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079732" version="1" comment="kernel-desktop-base is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079736" version="1" comment="kernel-desktop-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079738" version="1" comment="kernel-docs is &lt;3.4.42-2.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079739" version="1" comment="kernel-ec2 is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079740" version="1" comment="kernel-ec2-base is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079744" version="1" comment="kernel-ec2-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079746" version="1" comment="kernel-ec2-extra is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079748" version="1" comment="kernel-pae is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079749" version="1" comment="kernel-pae-base is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079753" version="1" comment="kernel-pae-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079755" version="1" comment="kernel-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079756" version="1" comment="kernel-source is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079757" version="1" comment="kernel-source-vanilla is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079758" version="1" comment="kernel-syms is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079759" version="1" comment="kernel-trace is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079760" version="1" comment="kernel-trace-base is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079764" version="1" comment="kernel-trace-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079766" version="1" comment="kernel-vanilla is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079769" version="1" comment="kernel-vanilla-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079771" version="1" comment="kernel-xen is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079772" version="1" comment="kernel-xen-base is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079776" version="1" comment="kernel-xen-devel is &lt;3.4.42-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079778" version="1" comment="xorg-x11-Xvnc is &lt;7.6_1.12.3-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079780" version="1" comment="xorg-x11-server is &lt;7.6_1.12.3-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079783" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.12.3-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079785" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.12.3-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079786" version="1" comment="strongswan is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079788" version="1" comment="strongswan-doc is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079789" version="1" comment="strongswan-ikev1 is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079791" version="1" comment="strongswan-ikev2 is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079793" version="1" comment="strongswan-ipsec is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079795" version="1" comment="strongswan-libs0 is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079797" version="1" comment="strongswan-mysql is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079799" version="1" comment="strongswan-nm is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079801" version="1" comment="strongswan-sqlite is &lt;4.6.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079803" version="1" comment="python-httplib2 is &lt;0.7.4-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079804" version="1" comment="telepathy-idle is &lt;0.1.11-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079807" version="1" comment="gnutls is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079810" version="1" comment="libgnutls-devel is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079811" version="1" comment="libgnutls-devel-32bit is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079812" version="1" comment="libgnutls-openssl-devel is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079813" version="1" comment="libgnutls-openssl27 is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079815" version="1" comment="libgnutls28 is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079816" version="1" comment="libgnutls28-32bit is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079819" version="1" comment="libgnutlsxx-devel is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079820" version="1" comment="libgnutlsxx28 is &lt;3.0.20-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079822" version="1" comment="icedtea-web is &lt;1.4-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079825" version="1" comment="icedtea-web-javadoc is &lt;1.4-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079826" version="1" comment="clamav is &lt;0.97.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079827" version="1" comment="clamav-db is &lt;0.97.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079830" version="1" comment="libtiff-devel-32bit is &lt;4.0.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079831" version="1" comment="libtiff-devel is &lt;4.0.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079832" version="1" comment="libtiff5-32bit is &lt;4.0.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079833" version="1" comment="libtiff5 is &lt;4.0.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079836" version="1" comment="tiff is &lt;4.0.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079839" version="1" comment="samba-doc is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079840" version="1" comment="ldapsmb is &lt;1.34b-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079841" version="1" comment="libnetapi-devel is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079842" version="1" comment="libnetapi0 is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079844" version="1" comment="libsmbclient-devel is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079845" version="1" comment="libsmbclient0 is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079846" version="1" comment="libsmbclient0-32bit is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079849" version="1" comment="libsmbsharemodes-devel is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079850" version="1" comment="libsmbsharemodes0 is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079852" version="1" comment="libwbclient-devel is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079853" version="1" comment="libwbclient0 is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079854" version="1" comment="libwbclient0-32bit is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079857" version="1" comment="samba is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079858" version="1" comment="samba-32bit is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079859" version="1" comment="samba-client is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079860" version="1" comment="samba-client-32bit is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079866" version="1" comment="samba-devel is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079867" version="1" comment="samba-krb-printing is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079869" version="1" comment="samba-winbind is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079870" version="1" comment="samba-winbind-32bit is &lt;3.6.7-48.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079873" version="1" comment="MozillaFirefox-branding-openSUSE is &lt;21-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079874" version="1" comment="MozillaFirefox is &lt;21.0-2.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079875" version="1" comment="MozillaFirefox-branding-upstream is &lt;21.0-2.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079876" version="1" comment="MozillaFirefox-buildsymbols is &lt;21.0-2.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079879" version="1" comment="MozillaFirefox-devel is &lt;21.0-2.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079880" version="1" comment="MozillaFirefox-translations-common is &lt;21.0-2.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079881" version="1" comment="MozillaFirefox-translations-other is &lt;21.0-2.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079882" version="1" comment="MozillaThunderbird is &lt;17.0.6-49.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079883" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.6-49.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079886" version="1" comment="MozillaThunderbird-devel is &lt;17.0.6-49.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079888" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.6-49.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079889" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.6-49.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079890" version="1" comment="enigmail is &lt;1.5.1+17.0.6-49.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079892" version="1" comment="mozilla-js is &lt;17.0.6-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079893" version="1" comment="mozilla-js-32bit is &lt;17.0.6-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079896" version="1" comment="xulrunner is &lt;17.0.6-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079897" version="1" comment="xulrunner-32bit is &lt;17.0.6-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079898" version="1" comment="xulrunner-buildsymbols is &lt;17.0.6-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079902" version="1" comment="xulrunner-devel is &lt;17.0.6-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079904" version="1" comment="gpg2 is &lt;2.0.19-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079907" version="1" comment="gpg2-lang is &lt;2.0.19-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079908" version="1" comment="wireshark is &lt;1.8.7-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079911" version="1" comment="wireshark-devel is &lt;1.8.7-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079912" version="1" comment="kernel-debug is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079913" version="1" comment="kernel-debug-base is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079917" version="1" comment="kernel-debug-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079919" version="1" comment="kernel-default is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079920" version="1" comment="kernel-default-base is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079924" version="1" comment="kernel-default-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079926" version="1" comment="kernel-desktop is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079927" version="1" comment="kernel-desktop-base is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079931" version="1" comment="kernel-desktop-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079933" version="1" comment="kernel-docs is &lt;3.4.47-2.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079934" version="1" comment="kernel-ec2 is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079935" version="1" comment="kernel-ec2-base is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079939" version="1" comment="kernel-ec2-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079941" version="1" comment="kernel-ec2-extra is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079943" version="1" comment="kernel-pae is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079944" version="1" comment="kernel-pae-base is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079948" version="1" comment="kernel-pae-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079950" version="1" comment="kernel-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079951" version="1" comment="kernel-source is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079952" version="1" comment="kernel-source-vanilla is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079953" version="1" comment="kernel-syms is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079954" version="1" comment="kernel-trace is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079955" version="1" comment="kernel-trace-base is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079959" version="1" comment="kernel-trace-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079961" version="1" comment="kernel-vanilla is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079964" version="1" comment="kernel-vanilla-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079966" version="1" comment="kernel-xen is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079967" version="1" comment="kernel-xen-base is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079971" version="1" comment="kernel-xen-devel is &lt;3.4.47-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079973" version="1" comment="nfs-client is &lt;1.2.6-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079975" version="1" comment="nfs-doc is &lt;1.2.6-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079976" version="1" comment="nfs-kernel-server is &lt;1.2.6-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079978" version="1" comment="nfs-utils is &lt;1.2.6-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079980" version="1" comment="libxcb is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079981" version="1" comment="libxcb-composite0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079982" version="1" comment="libxcb-composite0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079985" version="1" comment="libxcb-damage0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079986" version="1" comment="libxcb-damage0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079990" version="1" comment="libxcb-devel is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079991" version="1" comment="libxcb-devel-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079992" version="1" comment="libxcb-dpms0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079993" version="1" comment="libxcb-dpms0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079996" version="1" comment="libxcb-dri2-0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079997" version="1" comment="libxcb-dri2-0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080000" version="1" comment="libxcb-glx0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080001" version="1" comment="libxcb-glx0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080004" version="1" comment="libxcb-randr0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080005" version="1" comment="libxcb-randr0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080008" version="1" comment="libxcb-record0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080009" version="1" comment="libxcb-record0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080012" version="1" comment="libxcb-render0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080013" version="1" comment="libxcb-render0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080016" version="1" comment="libxcb-res0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080017" version="1" comment="libxcb-res0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080020" version="1" comment="libxcb-screensaver0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080021" version="1" comment="libxcb-screensaver0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080024" version="1" comment="libxcb-shape0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080025" version="1" comment="libxcb-shape0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080028" version="1" comment="libxcb-shm0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080029" version="1" comment="libxcb-shm0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080032" version="1" comment="libxcb-sync0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080033" version="1" comment="libxcb-sync0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080036" version="1" comment="libxcb-xevie0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080037" version="1" comment="libxcb-xevie0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080040" version="1" comment="libxcb-xf86dri0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080041" version="1" comment="libxcb-xf86dri0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080044" version="1" comment="libxcb-xfixes0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080045" version="1" comment="libxcb-xfixes0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080048" version="1" comment="libxcb-xinerama0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080049" version="1" comment="libxcb-xinerama0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080052" version="1" comment="libxcb-xprint0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080053" version="1" comment="libxcb-xprint0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080056" version="1" comment="libxcb-xtest0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080057" version="1" comment="libxcb-xtest0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080060" version="1" comment="libxcb-xv0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080061" version="1" comment="libxcb-xv0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080064" version="1" comment="libxcb-xvmc0 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080065" version="1" comment="libxcb-xvmc0-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080068" version="1" comment="libxcb1 is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080069" version="1" comment="libxcb1-32bit is &lt;1.8.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080072" version="1" comment="libXext is &lt;1.3.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080074" version="1" comment="libXext-devel is &lt;1.3.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080075" version="1" comment="libXext-devel-32bit is &lt;1.3.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080076" version="1" comment="libXext6 is &lt;1.3.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080077" version="1" comment="libXext6-32bit is &lt;1.3.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080080" version="1" comment="libXfixes is &lt;5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080082" version="1" comment="libXfixes-devel-32bit is &lt;5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080083" version="1" comment="libXfixes-devel is &lt;5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080084" version="1" comment="libXfixes3-32bit is &lt;5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080085" version="1" comment="libXfixes3 is &lt;5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080088" version="1" comment="libXp is &lt;1.0.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080090" version="1" comment="libXp-devel is &lt;1.0.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080091" version="1" comment="libXp-devel-32bit is &lt;1.0.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080092" version="1" comment="libXp6 is &lt;1.0.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080093" version="1" comment="libXp6-32bit is &lt;1.0.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080096" version="1" comment="libXrender is &lt;0.9.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080098" version="1" comment="libXrender-devel is &lt;0.9.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080099" version="1" comment="libXrender-devel-32bit is &lt;0.9.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080100" version="1" comment="libXrender1 is &lt;0.9.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080101" version="1" comment="libXrender1-32bit is &lt;0.9.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080104" version="1" comment="libXt is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080106" version="1" comment="libXt-devel is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080107" version="1" comment="libXt-devel-32bit is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080108" version="1" comment="libXt6 is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080109" version="1" comment="libXt6-32bit is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080112" version="1" comment="libXv is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080114" version="1" comment="libXv-devel is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080115" version="1" comment="libXv-devel-32bit is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080116" version="1" comment="libXv1 is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080117" version="1" comment="libXv1-32bit is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080120" version="1" comment="telepathy-gabble is &lt;0.16.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080123" version="1" comment="telepathy-gabble-xmpp-console is &lt;0.16.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080125" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080127" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080129" version="1" comment="subversion is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080130" version="1" comment="subversion-bash-completion is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080133" version="1" comment="subversion-devel is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080134" version="1" comment="subversion-perl is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080136" version="1" comment="subversion-python is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080138" version="1" comment="subversion-server is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080140" version="1" comment="subversion-tools is &lt;1.7.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080142" version="1" comment="autotrace is &lt;0.31.1-635.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080145" version="1" comment="autotrace-devel is &lt;0.31.1-635.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080146" version="1" comment="libautotrace3 is &lt;0.31.1-635.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080148" version="1" comment="libFS is &lt;1.0.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080150" version="1" comment="libFS-devel is &lt;1.0.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080151" version="1" comment="libFS-devel-32bit is &lt;1.0.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080152" version="1" comment="libFS6 is &lt;1.0.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080153" version="1" comment="libFS6-32bit is &lt;1.0.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080156" version="1" comment="libXcursor is &lt;1.1.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080158" version="1" comment="libXcursor-devel is &lt;1.1.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080159" version="1" comment="libXcursor-devel-32bit is &lt;1.1.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080160" version="1" comment="libXcursor1 is &lt;1.1.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080161" version="1" comment="libXcursor1-32bit is &lt;1.1.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080164" version="1" comment="libXi is &lt;1.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080166" version="1" comment="libXi-devel is &lt;1.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080167" version="1" comment="libXi-devel-32bit is &lt;1.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080168" version="1" comment="libXi6 is &lt;1.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080169" version="1" comment="libXi6-32bit is &lt;1.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080172" version="1" comment="libXinerama is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080174" version="1" comment="libXinerama-devel is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080175" version="1" comment="libXinerama-devel-32bit is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080176" version="1" comment="libXinerama1 is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080177" version="1" comment="libXinerama1-32bit is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080180" version="1" comment="libXrandr is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080182" version="1" comment="libXrandr-devel is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080183" version="1" comment="libXrandr-devel-32bit is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080184" version="1" comment="libXrandr2 is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080185" version="1" comment="libXrandr2-32bit is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080188" version="1" comment="libXRes1 is &lt;1.0.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080189" version="1" comment="libXRes1-32bit is &lt;1.0.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080192" version="1" comment="libXres is &lt;1.0.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080194" version="1" comment="libXres-devel is &lt;1.0.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080195" version="1" comment="libXres-devel-32bit is &lt;1.0.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080196" version="1" comment="libXtst is &lt;1.2.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080198" version="1" comment="libXtst-devel is &lt;1.2.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080199" version="1" comment="libXtst-devel-32bit is &lt;1.2.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080200" version="1" comment="libXtst6 is &lt;1.2.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080201" version="1" comment="libXtst6-32bit is &lt;1.2.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080204" version="1" comment="libXvMC is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080206" version="1" comment="libXvMC-devel is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080207" version="1" comment="libXvMC-devel-32bit is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080208" version="1" comment="libXvMC1 is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080209" version="1" comment="libXvMC1-32bit is &lt;1.0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080212" version="1" comment="libXxf86dga is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080214" version="1" comment="libXxf86dga-devel is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080215" version="1" comment="libXxf86dga-devel-32bit is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080216" version="1" comment="libXxf86dga1 is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080217" version="1" comment="libXxf86dga1-32bit is &lt;1.1.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080220" version="1" comment="libXxf86vm is &lt;1.1.2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080222" version="1" comment="libXxf86vm-devel is &lt;1.1.2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080223" version="1" comment="libXxf86vm-devel-32bit is &lt;1.1.2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080224" version="1" comment="libXxf86vm1 is &lt;1.1.2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080225" version="1" comment="libXxf86vm1-32bit is &lt;1.1.2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080228" version="1" comment="libdmx is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080230" version="1" comment="libdmx-devel is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080231" version="1" comment="libdmx-devel-32bit is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080232" version="1" comment="libdmx1 is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080233" version="1" comment="libdmx1-32bit is &lt;1.1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080236" version="1" comment="libX11 is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080237" version="1" comment="libX11-6 is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080238" version="1" comment="libX11-6-32bit is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080241" version="1" comment="libX11-data is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080243" version="1" comment="libX11-devel is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080244" version="1" comment="libX11-devel-32bit is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080245" version="1" comment="libX11-xcb1 is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080246" version="1" comment="libX11-xcb1-32bit is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080249" version="1" comment="darktable is &lt;1.0.5-3.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080252" version="1" comment="wireshark is &lt;1.8.8-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080255" version="1" comment="wireshark-devel is &lt;1.8.8-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080256" version="1" comment="phpMyAdmin is &lt;3.5.8.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080257" version="1" comment="openconnect is &lt;3.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080260" version="1" comment="openconnect-devel is &lt;3.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080261" version="1" comment="openconnect-doc is &lt;3.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080262" version="1" comment="openconnect-lang is &lt;3.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080263" version="1" comment="fail2ban is &lt;0.8.6-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080264" version="1" comment="krb5-doc is &lt;1.10.2-3.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080265" version="1" comment="krb5-mini is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080268" version="1" comment="krb5-mini-devel is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080269" version="1" comment="krb5 is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080270" version="1" comment="krb5-32bit is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080271" version="1" comment="krb5-client is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080276" version="1" comment="krb5-devel is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080277" version="1" comment="krb5-devel-32bit is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080278" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080280" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080282" version="1" comment="krb5-server is &lt;1.10.2-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080284" version="1" comment="curl is &lt;7.25.0-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080287" version="1" comment="libcurl-devel is &lt;7.25.0-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080288" version="1" comment="libcurl4-32bit is &lt;7.25.0-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080289" version="1" comment="libcurl4 is &lt;7.25.0-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080292" version="1" comment="MozillaFirefox is &lt;22.0-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080293" version="1" comment="MozillaFirefox-branding-upstream is &lt;22.0-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080294" version="1" comment="MozillaFirefox-buildsymbols is &lt;22.0-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080297" version="1" comment="MozillaFirefox-devel is &lt;22.0-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080298" version="1" comment="MozillaFirefox-translations-common is &lt;22.0-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080299" version="1" comment="MozillaFirefox-translations-other is &lt;22.0-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080300" version="1" comment="MozillaThunderbird is &lt;17.0.7-49.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080301" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.7-49.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080304" version="1" comment="MozillaThunderbird-devel is &lt;17.0.7-49.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080306" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.7-49.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080307" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.7-49.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080308" version="1" comment="enigmail is &lt;1.5.1+17.0.7-49.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080310" version="1" comment="mozilla-js is &lt;17.0.7-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080311" version="1" comment="mozilla-js-32bit is &lt;17.0.7-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080314" version="1" comment="xulrunner is &lt;17.0.7-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080315" version="1" comment="xulrunner-32bit is &lt;17.0.7-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080316" version="1" comment="xulrunner-buildsymbols is &lt;17.0.7-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080320" version="1" comment="xulrunner-devel is &lt;17.0.7-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080322" version="1" comment="xorg-x11-Xvnc is &lt;7.6_1.12.3-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080324" version="1" comment="xorg-x11-server is &lt;7.6_1.12.3-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080327" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.12.3-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080329" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.12.3-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080330" version="1" comment="python-bugzilla is &lt;0.6.2-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080331" version="1" comment="nagios is &lt;3.5.0-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080334" version="1" comment="nagios-devel is &lt;3.5.0-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080335" version="1" comment="nagios-www is &lt;3.5.0-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080336" version="1" comment="nagios-www-dch is &lt;3.5.0-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080338" version="1" comment="chromedriver is &lt;30.0.1553.0-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080340" version="1" comment="chromium is &lt;30.0.1553.0-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080343" version="1" comment="chromium-desktop-gnome is &lt;30.0.1553.0-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080344" version="1" comment="chromium-desktop-kde is &lt;30.0.1553.0-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080345" version="1" comment="chromium-ffmpegsumo is &lt;30.0.1553.0-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080347" version="1" comment="chromium-suid-helper is &lt;30.0.1553.0-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080349" version="1" comment="libkdcraw is &lt;4.8.5-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080351" version="1" comment="libkdcraw-devel is &lt;4.8.5-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080352" version="1" comment="libkdcraw20 is &lt;4.8.5-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080354" version="1" comment="ruby19 is &lt;1.9.3.p392-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080357" version="1" comment="ruby19-devel is &lt;1.9.3.p392-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080358" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080359" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080360" version="1" comment="ruby19-tk is &lt;1.9.3.p392-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080362" version="1" comment="perl-Module-Signature is &lt;0.73-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080363" version="1" comment="seamonkey is &lt;2.19-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080366" version="1" comment="seamonkey-dom-inspector is &lt;2.19-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080367" version="1" comment="seamonkey-irc is &lt;2.19-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080368" version="1" comment="seamonkey-translations-common is &lt;2.19-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080369" version="1" comment="seamonkey-translations-other is &lt;2.19-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080370" version="1" comment="seamonkey-venkman is &lt;2.19-2.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080371" version="1" comment="Mesa-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080372" version="1" comment="Mesa is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080376" version="1" comment="Mesa-devel-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080377" version="1" comment="Mesa-devel is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080378" version="1" comment="Mesa-libEGL-devel-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080379" version="1" comment="Mesa-libEGL-devel is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080380" version="1" comment="Mesa-libEGL1-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080381" version="1" comment="Mesa-libEGL1 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080384" version="1" comment="Mesa-libGL-devel-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080385" version="1" comment="Mesa-libGL-devel is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080386" version="1" comment="Mesa-libGL1-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080387" version="1" comment="Mesa-libGL1 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080390" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080391" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080392" version="1" comment="Mesa-libGLESv1_CM1-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080393" version="1" comment="Mesa-libGLESv1_CM1 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080396" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080397" version="1" comment="Mesa-libGLESv2-2 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080400" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080401" version="1" comment="Mesa-libGLESv2-devel is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080402" version="1" comment="Mesa-libGLU-devel-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080403" version="1" comment="Mesa-libGLU-devel is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080404" version="1" comment="Mesa-libGLU1-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080405" version="1" comment="Mesa-libGLU1 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080408" version="1" comment="Mesa-libIndirectGL1-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080409" version="1" comment="Mesa-libIndirectGL1 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080412" version="1" comment="Mesa-libglapi0-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080413" version="1" comment="Mesa-libglapi0 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080416" version="1" comment="libOSMesa8-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080417" version="1" comment="libOSMesa8 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080420" version="1" comment="libXvMC_nouveau-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080421" version="1" comment="libXvMC_nouveau is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080424" version="1" comment="libXvMC_r300-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080425" version="1" comment="libXvMC_r300 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080428" version="1" comment="libXvMC_r600-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080429" version="1" comment="libXvMC_r600 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080432" version="1" comment="libXvMC_softpipe-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080433" version="1" comment="libXvMC_softpipe is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080436" version="1" comment="libgbm-devel is &lt;0.0.0-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080437" version="1" comment="libgbm-devel-32bit is &lt;0.0.0-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080438" version="1" comment="libgbm1 is &lt;0.0.0-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080439" version="1" comment="libgbm1-32bit is &lt;0.0.0-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080442" version="1" comment="libvdpau_nouveau-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080443" version="1" comment="libvdpau_nouveau is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080446" version="1" comment="libvdpau_r300-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080447" version="1" comment="libvdpau_r300 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080450" version="1" comment="libvdpau_r600-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080451" version="1" comment="libvdpau_r600 is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080454" version="1" comment="libvdpau_softpipe-32bit is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080455" version="1" comment="libvdpau_softpipe is &lt;8.0.4-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080458" version="1" comment="libxatracker-devel is &lt;1.0.0-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080459" version="1" comment="libxatracker1 is &lt;1.0.0-20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080461" version="1" comment="python-suds is &lt;0.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080462" version="1" comment="qemu is &lt;1.1.2-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080465" version="1" comment="qemu-guest-agent is &lt;1.1.2-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080467" version="1" comment="qemu-linux-user is &lt;1.1.2-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080468" version="1" comment="qemu-tools is &lt;1.1.2-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080470" version="1" comment="tinyproxy is &lt;1.8.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080473" version="1" comment="cgit is &lt;0.9.0.2-14.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080476" version="1" comment="python-django is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080477" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080480" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080482" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080484" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080485" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080486" version="1" comment="libxml2-2 is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080487" version="1" comment="libxml2-2-32bit is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080490" version="1" comment="libxml2 is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080492" version="1" comment="libxml2-devel is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080493" version="1" comment="libxml2-devel-32bit is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080494" version="1" comment="libxml2-doc is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080495" version="1" comment="libxml2-tools is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080497" version="1" comment="python-libxml2 is &lt;2.7.8+git20120223-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080500" version="1" comment="nagstamon is &lt;0.9.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080501" version="1" comment="apache2-mod_php5 is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080503" version="1" comment="php5 is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080504" version="1" comment="php5-bcmath is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080506" version="1" comment="php5-bz2 is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080508" version="1" comment="php5-calendar is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080510" version="1" comment="php5-ctype is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080512" version="1" comment="php5-curl is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080514" version="1" comment="php5-dba is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080518" version="1" comment="php5-devel is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080519" version="1" comment="php5-dom is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080521" version="1" comment="php5-enchant is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080523" version="1" comment="php5-exif is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080525" version="1" comment="php5-fastcgi is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080527" version="1" comment="php5-fileinfo is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080529" version="1" comment="php5-fpm is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080531" version="1" comment="php5-ftp is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080533" version="1" comment="php5-gd is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080535" version="1" comment="php5-gettext is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080537" version="1" comment="php5-gmp is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080539" version="1" comment="php5-iconv is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080541" version="1" comment="php5-imap is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080543" version="1" comment="php5-intl is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080545" version="1" comment="php5-json is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080547" version="1" comment="php5-ldap is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080549" version="1" comment="php5-mbstring is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080551" version="1" comment="php5-mcrypt is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080553" version="1" comment="php5-mssql is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080555" version="1" comment="php5-mysql is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080557" version="1" comment="php5-odbc is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080559" version="1" comment="php5-openssl is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080561" version="1" comment="php5-pcntl is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080563" version="1" comment="php5-pdo is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080565" version="1" comment="php5-pear is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080566" version="1" comment="php5-pgsql is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080568" version="1" comment="php5-phar is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080570" version="1" comment="php5-posix is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080572" version="1" comment="php5-pspell is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080574" version="1" comment="php5-readline is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080576" version="1" comment="php5-shmop is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080578" version="1" comment="php5-snmp is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080580" version="1" comment="php5-soap is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080582" version="1" comment="php5-sockets is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080584" version="1" comment="php5-sqlite is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080586" version="1" comment="php5-suhosin is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080588" version="1" comment="php5-sysvmsg is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080590" version="1" comment="php5-sysvsem is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080592" version="1" comment="php5-sysvshm is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080594" version="1" comment="php5-tidy is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080596" version="1" comment="php5-tokenizer is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080598" version="1" comment="php5-wddx is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080600" version="1" comment="php5-xmlreader is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080602" version="1" comment="php5-xmlrpc is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080604" version="1" comment="php5-xmlwriter is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080606" version="1" comment="php5-xsl is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080608" version="1" comment="php5-zip is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080610" version="1" comment="php5-zlib is &lt;5.3.15-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080612" version="1" comment="lcms2 is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080615" version="1" comment="liblcms2-2 is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080616" version="1" comment="liblcms2-2-32bit is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080619" version="1" comment="liblcms2-devel is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080620" version="1" comment="liblcms2-devel-32bit is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080621" version="1" comment="liblcms2-doc is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080622" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080624" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080626" version="1" comment="subversion is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080627" version="1" comment="subversion-bash-completion is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080630" version="1" comment="subversion-devel is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080631" version="1" comment="subversion-perl is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080633" version="1" comment="subversion-python is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080635" version="1" comment="subversion-server is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080637" version="1" comment="subversion-tools is &lt;1.7.11-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080639" version="1" comment="kde4-kgreeter-plugins is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080641" version="1" comment="kdebase4-workspace is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080642" version="1" comment="kdebase4-workspace-branding-upstream is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080645" version="1" comment="kdebase4-workspace-devel is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080647" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080649" version="1" comment="kdebase4-workspace-liboxygenstyle-32bit is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080650" version="1" comment="kdebase4-workspace-liboxygenstyle is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080653" version="1" comment="kdebase4-workspace-plasma-calendar is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080655" version="1" comment="kdebase4-workspace-plasma-engine-akonadi is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080657" version="1" comment="kdm is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080658" version="1" comment="kdm-branding-upstream is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080660" version="1" comment="kwin is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080662" version="1" comment="python-kdebase4 is &lt;4.8.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090263" version="1" comment="tomcat is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090264" version="1" comment="tomcat-admin-webapps is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090265" version="1" comment="tomcat-docs-webapp is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090266" version="1" comment="tomcat-el-2_2-api is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090267" version="1" comment="tomcat-javadoc is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090268" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090269" version="1" comment="tomcat-jsvc is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090270" version="1" comment="tomcat-lib is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090271" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090272" version="1" comment="tomcat-webapps is &lt;7.0.27-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080673" version="1" comment="libgcrypt is &lt;1.5.3-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080675" version="1" comment="libgcrypt-devel is &lt;1.5.3-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080676" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.3-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080679" version="1" comment="libgcrypt11 is &lt;1.5.3-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080680" version="1" comment="libgcrypt11-32bit is &lt;1.5.3-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080683" version="1" comment="wireshark is &lt;1.8.9-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080686" version="1" comment="wireshark-devel is &lt;1.8.9-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089848" version="1" comment="apache2 is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089851" version="1" comment="apache2-devel is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089852" version="1" comment="apache2-doc is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089853" version="1" comment="apache2-event is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089855" version="1" comment="apache2-example-pages is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089856" version="1" comment="apache2-itk is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089858" version="1" comment="apache2-prefork is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089860" version="1" comment="apache2-utils is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089862" version="1" comment="apache2-worker is &lt;2.2.22-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089864" version="1" comment="otrs is &lt;3.1.18-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089865" version="1" comment="otrs-doc is &lt;3.1.18-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089866" version="1" comment="otrs-itsm is &lt;3.1.10-20.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089867" version="1" comment="apache2-mod_security2 is &lt;2.7.5-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089870" version="1" comment="libmariadbclient18-32bit is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089871" version="1" comment="libmariadbclient18 is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089874" version="1" comment="libmariadbclient_r18-32bit is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089875" version="1" comment="libmariadbclient_r18 is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089876" version="1" comment="mariadb is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089877" version="1" comment="mariadb-bench is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089879" version="1" comment="mariadb-client is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089881" version="1" comment="mariadb-debug-version is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089885" version="1" comment="mariadb-errormessages is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089886" version="1" comment="mariadb-test is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089888" version="1" comment="mariadb-tools is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089890" version="1" comment="libmysqlclient-devel is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089891" version="1" comment="libmysqlclient18-32bit is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089892" version="1" comment="libmysqlclient18 is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089895" version="1" comment="libmysqlclient_r18-32bit is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089896" version="1" comment="libmysqlclient_r18 is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089897" version="1" comment="libmysqld-devel is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089898" version="1" comment="libmysqld18 is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089900" version="1" comment="mysql-community-server is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089901" version="1" comment="mysql-community-server-bench is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089903" version="1" comment="mysql-community-server-client is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089905" version="1" comment="mysql-community-server-debug-version is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089909" version="1" comment="mysql-community-server-errormessages is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089910" version="1" comment="mysql-community-server-test is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089912" version="1" comment="mysql-community-server-tools is &lt;5.5.32-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089914" version="1" comment="strongswan is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089916" version="1" comment="strongswan-doc is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089917" version="1" comment="strongswan-ikev1 is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089919" version="1" comment="strongswan-ikev2 is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089921" version="1" comment="strongswan-ipsec is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089923" version="1" comment="strongswan-libs0 is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089925" version="1" comment="strongswan-mysql is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089927" version="1" comment="strongswan-nm is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089929" version="1" comment="strongswan-sqlite is &lt;4.6.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089931" version="1" comment="samba-doc is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089932" version="1" comment="libnetapi-devel is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089933" version="1" comment="libnetapi0 is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089935" version="1" comment="libsmbclient-devel is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089936" version="1" comment="libsmbclient0 is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089937" version="1" comment="libsmbclient0-32bit is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089940" version="1" comment="libsmbsharemodes-devel is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089941" version="1" comment="libsmbsharemodes0 is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089943" version="1" comment="libwbclient-devel is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089944" version="1" comment="libwbclient0 is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089945" version="1" comment="libwbclient0-32bit is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089948" version="1" comment="samba is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089949" version="1" comment="samba-32bit is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089950" version="1" comment="samba-client is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089951" version="1" comment="samba-client-32bit is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089957" version="1" comment="samba-devel is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089958" version="1" comment="samba-krb-printing is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089960" version="1" comment="samba-winbind is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089961" version="1" comment="samba-winbind-32bit is &lt;3.6.7-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090386" version="1" comment="libzypp is &lt;11.13.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090389" version="1" comment="libzypp-devel is &lt;11.13.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089964" version="1" comment="phpMyAdmin is &lt;4.0.5-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090049" version="1" comment="MozillaFirefox is &lt;23.0-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090050" version="1" comment="MozillaFirefox-branding-upstream is &lt;23.0-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090051" version="1" comment="MozillaFirefox-buildsymbols is &lt;23.0-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090054" version="1" comment="MozillaFirefox-devel is &lt;23.0-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090055" version="1" comment="MozillaFirefox-translations-common is &lt;23.0-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090056" version="1" comment="MozillaFirefox-translations-other is &lt;23.0-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090057" version="1" comment="MozillaThunderbird is &lt;17.0.8-49.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090058" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.8-49.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090061" version="1" comment="MozillaThunderbird-devel is &lt;17.0.8-49.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090063" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.8-49.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090064" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.8-49.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090065" version="1" comment="enigmail is &lt;1.5.2+17.0.8-49.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090067" version="1" comment="mozilla-nspr-32bit is &lt;4.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090068" version="1" comment="mozilla-nspr is &lt;4.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090072" version="1" comment="mozilla-nspr-devel is &lt;4.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090073" version="1" comment="libfreebl3 is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090074" version="1" comment="libfreebl3-32bit is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090077" version="1" comment="libsoftokn3 is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090078" version="1" comment="libsoftokn3-32bit is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090081" version="1" comment="mozilla-nss is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090082" version="1" comment="mozilla-nss-32bit is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090083" version="1" comment="mozilla-nss-certs is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090084" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090090" version="1" comment="mozilla-nss-devel is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090091" version="1" comment="mozilla-nss-sysinit is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090092" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090095" version="1" comment="mozilla-nss-tools is &lt;3.15.1-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090097" version="1" comment="seamonkey is &lt;2.20-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090100" version="1" comment="seamonkey-dom-inspector is &lt;2.20-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090101" version="1" comment="seamonkey-irc is &lt;2.20-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090102" version="1" comment="seamonkey-translations-common is &lt;2.20-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090103" version="1" comment="seamonkey-translations-other is &lt;2.20-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090104" version="1" comment="seamonkey-venkman is &lt;2.20-2.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090105" version="1" comment="mozilla-js is &lt;17.0.8-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090106" version="1" comment="mozilla-js-32bit is &lt;17.0.8-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090109" version="1" comment="xulrunner is &lt;17.0.8-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090110" version="1" comment="xulrunner-32bit is &lt;17.0.8-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090111" version="1" comment="xulrunner-buildsymbols is &lt;17.0.8-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090115" version="1" comment="xulrunner-devel is &lt;17.0.8-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090231" version="1" comment="bind is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090232" version="1" comment="bind-chrootenv is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090235" version="1" comment="bind-devel is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090236" version="1" comment="bind-doc is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090237" version="1" comment="bind-libs-32bit is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090238" version="1" comment="bind-libs is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090241" version="1" comment="bind-lwresd is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090243" version="1" comment="bind-utils is &lt;9.9.2P2-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090117" version="1" comment="filezilla is &lt;3.7.3-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090120" version="1" comment="filezilla-lang is &lt;3.7.3-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090273" version="1" comment="libpoppler-qt4-4 is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090275" version="1" comment="libpoppler-qt4-devel is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090276" version="1" comment="poppler-qt is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090278" version="1" comment="libpoppler-cpp0 is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090280" version="1" comment="libpoppler-devel is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090281" version="1" comment="libpoppler-glib-devel is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090282" version="1" comment="libpoppler-glib8 is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090284" version="1" comment="libpoppler25 is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090286" version="1" comment="poppler is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090288" version="1" comment="poppler-tools is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090290" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.20.0-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090305" version="1" comment="cacti is &lt;0.8.8b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090329" version="1" comment="ruby is &lt;1.9.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090330" version="1" comment="ruby-common is &lt;1.9.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090331" version="1" comment="ruby-devel is &lt;1.9.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090332" version="1" comment="xen is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090334" version="1" comment="xen-devel is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090335" version="1" comment="xen-kmp-default is &lt;4.1.5_04_k3.4.47_2.38-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090337" version="1" comment="xen-kmp-desktop is &lt;4.1.5_04_k3.4.47_2.38-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090339" version="1" comment="xen-kmp-pae is &lt;4.1.5_04_k3.4.47_2.38-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090341" version="1" comment="xen-libs-32bit is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090342" version="1" comment="xen-libs is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090345" version="1" comment="xen-tools-domU is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090347" version="1" comment="xen-doc-html is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090348" version="1" comment="xen-doc-pdf is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090349" version="1" comment="xen-tools is &lt;4.1.5_04-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090377" version="1" comment="libpixman-1-0 is &lt;0.24.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090378" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090381" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090382" version="1" comment="pixman is &lt;0.24.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090384" version="1" comment="roundcubemail is &lt;0.9.3-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090394" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090395" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090398" version="1" comment="python-base is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090399" version="1" comment="python-base-32bit is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090403" version="1" comment="python-devel is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090404" version="1" comment="python-xml is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090406" version="1" comment="python-doc is &lt;2.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090407" version="1" comment="python-doc-pdf is &lt;2.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090408" version="1" comment="python is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090409" version="1" comment="python-32bit is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090410" version="1" comment="python-curses is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090415" version="1" comment="python-demo is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090416" version="1" comment="python-gdbm is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090418" version="1" comment="python-idle is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090419" version="1" comment="python-tk is &lt;2.7.3-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090421" version="1" comment="libpython3_2mu1_0 is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090422" version="1" comment="libpython3_2mu1_0-32bit is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090425" version="1" comment="python3-2to3 is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090426" version="1" comment="python3-base is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090429" version="1" comment="python3-devel is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090430" version="1" comment="python3-idle is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090431" version="1" comment="python3-testsuite is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090433" version="1" comment="python3-tools is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090434" version="1" comment="python3-xml is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090436" version="1" comment="python3-doc is &lt;3.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090437" version="1" comment="python3-doc-pdf is &lt;3.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090438" version="1" comment="python3 is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090439" version="1" comment="python3-32bit is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090440" version="1" comment="python3-curses is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090442" version="1" comment="python3-dbm is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090447" version="1" comment="python3-tk is &lt;3.2.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090449" version="1" comment="squid is &lt;2.7.STABLE9-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090452" version="1" comment="squid3 is &lt;3.1.23-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090455" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090457" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090459" version="1" comment="subversion is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090460" version="1" comment="subversion-bash-completion is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090463" version="1" comment="subversion-devel is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090464" version="1" comment="subversion-perl is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090466" version="1" comment="subversion-python is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090468" version="1" comment="subversion-server is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090470" version="1" comment="subversion-tools is &lt;1.7.13-4.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090690" version="1" comment="wireshark is &lt;1.8.10-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090693" version="1" comment="wireshark-devel is &lt;1.8.10-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090694" version="1" comment="libtiff-devel-32bit is &lt;4.0.2-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090695" version="1" comment="libtiff-devel is &lt;4.0.2-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090696" version="1" comment="libtiff5-32bit is &lt;4.0.2-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090697" version="1" comment="libtiff5 is &lt;4.0.2-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090700" version="1" comment="tiff is &lt;4.0.2-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090719" version="1" comment="gpg2 is &lt;2.0.19-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090722" version="1" comment="gpg2-lang is &lt;2.0.19-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090723" version="1" comment="mozilla-js is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090724" version="1" comment="mozilla-js-32bit is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090727" version="1" comment="xulrunner is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090728" version="1" comment="xulrunner-32bit is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090729" version="1" comment="xulrunner-buildsymbols is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090733" version="1" comment="xulrunner-devel is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090735" version="1" comment="MozillaFirefox is &lt;24.0-2.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090736" version="1" comment="MozillaFirefox-branding-upstream is &lt;24.0-2.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090737" version="1" comment="MozillaFirefox-buildsymbols is &lt;24.0-2.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090740" version="1" comment="MozillaFirefox-devel is &lt;24.0-2.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090741" version="1" comment="MozillaFirefox-translations-common is &lt;24.0-2.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090742" version="1" comment="MozillaFirefox-translations-other is &lt;24.0-2.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090743" version="1" comment="MozillaThunderbird is &lt;24.0-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090744" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.0-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090747" version="1" comment="MozillaThunderbird-devel is &lt;24.0-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090748" version="1" comment="MozillaThunderbird-translations-common is &lt;24.0-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090749" version="1" comment="MozillaThunderbird-translations-other is &lt;24.0-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090750" version="1" comment="enigmail is &lt;1.5.2+24.0-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090751" version="1" comment="seamonkey is &lt;2.21-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090754" version="1" comment="seamonkey-dom-inspector is &lt;2.21-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090755" version="1" comment="seamonkey-irc is &lt;2.21-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090756" version="1" comment="seamonkey-translations-common is &lt;2.21-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090757" version="1" comment="seamonkey-translations-other is &lt;2.21-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090758" version="1" comment="seamonkey-venkman is &lt;2.21-2.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090759" version="1" comment="python-django is &lt;1.4.8-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090838" version="1" comment="boost is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090839" version="1" comment="boost-devel is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090840" version="1" comment="boost-devel-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090841" version="1" comment="boost-doc-html is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090842" version="1" comment="boost-doc-man is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090843" version="1" comment="boost-doc-pdf is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090844" version="1" comment="boost-license1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090845" version="1" comment="libboost_chrono1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090846" version="1" comment="libboost_date_time1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090847" version="1" comment="libboost_date_time1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090848" version="1" comment="libboost_filesystem1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090849" version="1" comment="libboost_filesystem1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090850" version="1" comment="libboost_graph1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090851" version="1" comment="libboost_graph1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090852" version="1" comment="libboost_iostreams1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090853" version="1" comment="libboost_iostreams1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090854" version="1" comment="libboost_locale1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090855" version="1" comment="libboost_math1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090856" version="1" comment="libboost_math1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090857" version="1" comment="libboost_mpi1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090858" version="1" comment="libboost_mpi1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090859" version="1" comment="libboost_program_options1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090860" version="1" comment="libboost_program_options1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090861" version="1" comment="libboost_python1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090862" version="1" comment="libboost_python1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090863" version="1" comment="libboost_random1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090864" version="1" comment="libboost_random1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090865" version="1" comment="libboost_regex1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090866" version="1" comment="libboost_regex1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090867" version="1" comment="libboost_serialization1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090868" version="1" comment="libboost_serialization1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090869" version="1" comment="libboost_signals1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090870" version="1" comment="libboost_signals1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090871" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090872" version="1" comment="libboost_system1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090873" version="1" comment="libboost_test1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090874" version="1" comment="libboost_test1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090875" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090876" version="1" comment="libboost_thread1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090877" version="1" comment="libboost_timer1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090878" version="1" comment="libboost_wave1_49_0 is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090879" version="1" comment="libboost_wave1_49_0-32bit is &lt;1.49.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090924" version="1" comment="systemd-gtk is &lt;44-10.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090925" version="1" comment="systemd-32bit is &lt;44-10.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090926" version="1" comment="systemd is &lt;44-10.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090927" version="1" comment="systemd-analyze is &lt;44-10.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090928" version="1" comment="systemd-devel is &lt;44-10.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090929" version="1" comment="systemd-sysvinit is &lt;44-10.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090792" version="1" comment="icedtea-web is &lt;1.4.1-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090795" version="1" comment="icedtea-web-javadoc is &lt;1.4.1-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091167" version="1" comment="kernel-debug is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091168" version="1" comment="kernel-debug-base is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091169" version="1" comment="kernel-debug-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091170" version="1" comment="kernel-default is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091171" version="1" comment="kernel-default-base is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091172" version="1" comment="kernel-default-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091173" version="1" comment="kernel-desktop is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091174" version="1" comment="kernel-desktop-base is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091175" version="1" comment="kernel-desktop-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091176" version="1" comment="kernel-docs is &lt;3.4.63-2.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091177" version="1" comment="kernel-ec2 is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091178" version="1" comment="kernel-ec2-base is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091179" version="1" comment="kernel-ec2-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091180" version="1" comment="kernel-ec2-extra is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091181" version="1" comment="kernel-pae is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091182" version="1" comment="kernel-pae-base is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091183" version="1" comment="kernel-pae-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091184" version="1" comment="kernel-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091185" version="1" comment="kernel-source is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091186" version="1" comment="kernel-source-vanilla is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091187" version="1" comment="kernel-syms is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091188" version="1" comment="kernel-trace is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091189" version="1" comment="kernel-trace-base is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091190" version="1" comment="kernel-trace-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091191" version="1" comment="kernel-vanilla is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091192" version="1" comment="kernel-vanilla-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091193" version="1" comment="kernel-xen is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091194" version="1" comment="kernel-xen-base is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091195" version="1" comment="kernel-xen-devel is &lt;3.4.63-2.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090960" version="1" comment="libfreebl3 is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090961" version="1" comment="libfreebl3-32bit is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090962" version="1" comment="libsoftokn3 is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090963" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090964" version="1" comment="mozilla-nss is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090965" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090966" version="1" comment="mozilla-nss-certs is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090967" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090968" version="1" comment="mozilla-nss-devel is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090969" version="1" comment="mozilla-nss-sysinit is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090970" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090971" version="1" comment="mozilla-nss-tools is &lt;3.15.2-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090922" version="1" comment="gpg2 is &lt;2.0.19-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090923" version="1" comment="gpg2-lang is &lt;2.0.19-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091006" version="1" comment="rtkit is &lt;0.10_git201107141740-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090972" version="1" comment="clutter is &lt;1.10.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090973" version="1" comment="clutter-devel is &lt;1.10.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090974" version="1" comment="clutter-lang is &lt;1.10.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090975" version="1" comment="libclutter-1_0-0 is &lt;1.10.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090976" version="1" comment="libclutter-1_0-0-32bit is &lt;1.10.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090977" version="1" comment="typelib-1_0-Clutter-1_0 is &lt;1.10.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091024" version="1" comment="libvirt is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091025" version="1" comment="libvirt-client is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091026" version="1" comment="libvirt-client-32bit is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091027" version="1" comment="libvirt-devel is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091028" version="1" comment="libvirt-devel-32bit is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091029" version="1" comment="libvirt-doc is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091030" version="1" comment="libvirt-lock-sanlock is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091031" version="1" comment="libvirt-python is &lt;0.9.11.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091051" version="1" comment="chromedriver is &lt;30.0.1599.66-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091052" version="1" comment="chromium is &lt;30.0.1599.66-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091053" version="1" comment="chromium-desktop-gnome is &lt;30.0.1599.66-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091054" version="1" comment="chromium-desktop-kde is &lt;30.0.1599.66-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091055" version="1" comment="chromium-ffmpegsumo is &lt;30.0.1599.66-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091056" version="1" comment="chromium-suid-helper is &lt;30.0.1599.66-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091007" version="1" comment="lcms is &lt;1.19-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091008" version="1" comment="liblcms-devel is &lt;1.19-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091009" version="1" comment="liblcms-devel-32bit is &lt;1.19-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091010" version="1" comment="liblcms1 is &lt;1.19-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091011" version="1" comment="liblcms1-32bit is &lt;1.19-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091012" version="1" comment="python-lcms is &lt;1.19-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091013" version="1" comment="gpg2 is &lt;2.0.19-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091014" version="1" comment="gpg2-lang is &lt;2.0.19-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091068" version="1" comment="proftpd is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091069" version="1" comment="proftpd-devel is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091070" version="1" comment="proftpd-doc is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091071" version="1" comment="proftpd-lang is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091072" version="1" comment="proftpd-ldap is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091073" version="1" comment="proftpd-mysql is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091074" version="1" comment="proftpd-pgsql is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091075" version="1" comment="proftpd-radius is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091076" version="1" comment="proftpd-sqlite is &lt;1.3.4d-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091077" version="1" comment="libspice-client-glib-2_0-1 is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091078" version="1" comment="libspice-client-gtk-2_0-1 is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091079" version="1" comment="libspice-client-gtk-3_0-1 is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091080" version="1" comment="libspice-controller0 is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091081" version="1" comment="python-SpiceClientGtk is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091082" version="1" comment="spice-gtk is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091083" version="1" comment="spice-gtk-devel is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091084" version="1" comment="spice-gtk-lang is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091085" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091086" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091087" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.12-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091112" version="1" comment="ncat is &lt;6.01-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091113" version="1" comment="ndiff is &lt;6.01-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091114" version="1" comment="nmap is &lt;6.01-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091115" version="1" comment="nping is &lt;6.01-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091116" version="1" comment="zenmap is &lt;6.01-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091108" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-112.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091109" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-112.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091119" version="1" comment="libzrtpcpp is &lt;2.0.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091120" version="1" comment="libzrtpcpp-devel is &lt;2.0.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091121" version="1" comment="libzrtpcpp2 is &lt;2.0.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091125" version="1" comment="ruby19 is &lt;1.9.3.p392-3.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091126" version="1" comment="ruby19-devel is &lt;1.9.3.p392-3.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091127" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-3.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091128" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-3.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091129" version="1" comment="ruby19-tk is &lt;1.9.3.p392-3.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091130" version="1" comment="xorg-x11-Xvnc is &lt;7.6_1.12.3-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091131" version="1" comment="xorg-x11-server is &lt;7.6_1.12.3-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091132" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.12.3-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091133" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.12.3-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091134" version="1" comment="apache2-mod_fcgid is &lt;2.3.6-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091144" version="1" comment="hplip is &lt;3.12.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091145" version="1" comment="hplip-hpijs is &lt;3.12.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091146" version="1" comment="hplip-sane is &lt;3.12.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091342" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091343" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091344" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091345" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091346" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091216" version="1" comment="libmodplug is &lt;0.8.8.4-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091217" version="1" comment="libmodplug-devel is &lt;0.8.8.4-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091218" version="1" comment="libmodplug1 is &lt;0.8.8.4-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091219" version="1" comment="libmodplug1-32bit is &lt;0.8.8.4-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091201" version="1" comment="libopenssl-devel is &lt;1.0.1e-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091202" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091203" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091204" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091205" version="1" comment="openssl is &lt;1.0.1e-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091206" version="1" comment="openssl-doc is &lt;1.0.1e-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091220" version="1" comment="xen is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091221" version="1" comment="xen-devel is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091222" version="1" comment="xen-kmp-default is &lt;4.1.6_01_k3.4.47_2.38-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091223" version="1" comment="xen-kmp-desktop is &lt;4.1.6_01_k3.4.47_2.38-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091224" version="1" comment="xen-kmp-pae is &lt;4.1.6_01_k3.4.47_2.38-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091225" version="1" comment="xen-libs-32bit is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091226" version="1" comment="xen-libs is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091227" version="1" comment="xen-tools-domU is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091228" version="1" comment="xen-doc-html is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091229" version="1" comment="xen-doc-pdf is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091230" version="1" comment="xen-tools is &lt;4.1.6_01-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091231" version="1" comment="MozillaFirefox is &lt;25.0-2.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091232" version="1" comment="MozillaFirefox-branding-upstream is &lt;25.0-2.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091233" version="1" comment="MozillaFirefox-buildsymbols is &lt;25.0-2.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091234" version="1" comment="MozillaFirefox-devel is &lt;25.0-2.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091235" version="1" comment="MozillaFirefox-translations-common is &lt;25.0-2.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091236" version="1" comment="MozillaFirefox-translations-other is &lt;25.0-2.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091237" version="1" comment="MozillaThunderbird is &lt;24.1.0-49.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091238" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.1.0-49.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091239" version="1" comment="MozillaThunderbird-devel is &lt;24.1.0-49.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091240" version="1" comment="MozillaThunderbird-translations-common is &lt;24.1.0-49.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091241" version="1" comment="MozillaThunderbird-translations-other is &lt;24.1.0-49.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091242" version="1" comment="enigmail is &lt;1.6.0+24.1.0-49.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091243" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091244" version="1" comment="mozilla-nspr is &lt;4.10.1-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091245" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091246" version="1" comment="mozilla-js is &lt;17.0.10-2.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091247" version="1" comment="mozilla-js-32bit is &lt;17.0.10-2.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091248" version="1" comment="xulrunner is &lt;17.0.10-2.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091249" version="1" comment="xulrunner-32bit is &lt;17.0.10-2.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091250" version="1" comment="xulrunner-buildsymbols is &lt;17.0.10-2.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091251" version="1" comment="xulrunner-devel is &lt;17.0.10-2.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091304" version="1" comment="python-pyOpenSSL-doc is &lt;0.12-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091305" version="1" comment="python-pyOpenSSL is &lt;0.12-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091306" version="1" comment="openvpn is &lt;2.2.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091307" version="1" comment="openvpn-auth-pam-plugin is &lt;2.2.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091308" version="1" comment="openvpn-down-root-plugin is &lt;2.2.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091309" version="1" comment="seamonkey is &lt;2.22-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091310" version="1" comment="seamonkey-dom-inspector is &lt;2.22-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091311" version="1" comment="seamonkey-irc is &lt;2.22-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091312" version="1" comment="seamonkey-translations-common is &lt;2.22-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091313" version="1" comment="seamonkey-translations-other is &lt;2.22-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091314" version="1" comment="seamonkey-venkman is &lt;2.22-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091416" version="1" comment="libvarnishapi1 is &lt;3.0.2-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091417" version="1" comment="varnish is &lt;3.0.2-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091418" version="1" comment="varnish-devel is &lt;3.0.2-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091347" version="1" comment="apache2-mod_fcgid is &lt;2.3.6-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091358" version="1" comment="wireshark is &lt;1.8.11-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091359" version="1" comment="wireshark-devel is &lt;1.8.11-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091360" version="1" comment="whois is &lt;5.0.26-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091444" version="1" comment="chromedriver is &lt;30.0.1599.114-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091445" version="1" comment="chromium is &lt;30.0.1599.114-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091446" version="1" comment="chromium-desktop-gnome is &lt;30.0.1599.114-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091447" version="1" comment="chromium-desktop-kde is &lt;30.0.1599.114-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091448" version="1" comment="chromium-ffmpegsumo is &lt;30.0.1599.114-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091449" version="1" comment="chromium-suid-helper is &lt;30.0.1599.114-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091692" version="1" comment="samba-doc is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091693" version="1" comment="libnetapi-devel is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091694" version="1" comment="libnetapi0 is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091695" version="1" comment="libsmbclient-devel is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091696" version="1" comment="libsmbclient0 is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091697" version="1" comment="libsmbclient0-32bit is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091698" version="1" comment="libsmbsharemodes-devel is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091699" version="1" comment="libsmbsharemodes0 is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091700" version="1" comment="libwbclient-devel is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091701" version="1" comment="libwbclient0 is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091702" version="1" comment="libwbclient0-32bit is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091703" version="1" comment="samba is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091704" version="1" comment="samba-32bit is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091705" version="1" comment="samba-client is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091706" version="1" comment="samba-client-32bit is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091707" version="1" comment="samba-devel is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091708" version="1" comment="samba-krb-printing is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091709" version="1" comment="samba-winbind is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091710" version="1" comment="samba-winbind-32bit is &lt;3.6.7-48.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091511" version="1" comment="krb5-doc is &lt;1.10.2-3.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091512" version="1" comment="krb5-mini is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091513" version="1" comment="krb5-mini-devel is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091514" version="1" comment="krb5 is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091515" version="1" comment="krb5-32bit is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091516" version="1" comment="krb5-client is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091517" version="1" comment="krb5-devel is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091518" version="1" comment="krb5-devel-32bit is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091519" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091520" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091521" version="1" comment="krb5-server is &lt;1.10.2-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091450" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091451" version="1" comment="mozilla-nspr is &lt;4.10.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091452" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091453" version="1" comment="libfreebl3 is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091454" version="1" comment="libfreebl3-32bit is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091455" version="1" comment="libsoftokn3 is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091456" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091457" version="1" comment="mozilla-nss is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091458" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091459" version="1" comment="mozilla-nss-certs is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091460" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091461" version="1" comment="mozilla-nss-devel is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091462" version="1" comment="mozilla-nss-sysinit is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091463" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091464" version="1" comment="mozilla-nss-tools is &lt;3.15.3-2.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091680" version="1" comment="chromedriver is &lt;31.0.1650.57-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091681" version="1" comment="chromium is &lt;31.0.1650.57-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091682" version="1" comment="chromium-desktop-gnome is &lt;31.0.1650.57-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091683" version="1" comment="chromium-desktop-kde is &lt;31.0.1650.57-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091684" version="1" comment="chromium-ffmpegsumo is &lt;31.0.1650.57-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091685" version="1" comment="chromium-suid-helper is &lt;31.0.1650.57-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092007" version="1" comment="gtk3 is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092008" version="1" comment="gtk3-branding-upstream is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092009" version="1" comment="gtk3-data is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092010" version="1" comment="gtk3-devel is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092011" version="1" comment="gtk3-immodule-amharic is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092012" version="1" comment="gtk3-immodule-amharic-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092013" version="1" comment="gtk3-immodule-inuktitut is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092014" version="1" comment="gtk3-immodule-inuktitut-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092015" version="1" comment="gtk3-immodule-multipress is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092016" version="1" comment="gtk3-immodule-multipress-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092017" version="1" comment="gtk3-immodule-thai is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092018" version="1" comment="gtk3-immodule-thai-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092019" version="1" comment="gtk3-immodule-vietnamese is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092020" version="1" comment="gtk3-immodule-vietnamese-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092021" version="1" comment="gtk3-immodule-xim is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092022" version="1" comment="gtk3-immodule-xim-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092023" version="1" comment="gtk3-immodules-tigrigna is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092024" version="1" comment="gtk3-immodules-tigrigna-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092025" version="1" comment="gtk3-lang is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092026" version="1" comment="gtk3-tools is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092027" version="1" comment="gtk3-tools-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092028" version="1" comment="libgtk-3-0 is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092029" version="1" comment="libgtk-3-0-32bit is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092030" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.4.4-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092031" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092032" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092033" version="1" comment="gtk2-engine-svg is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092034" version="1" comment="gtk2-engine-svg-32bit is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092035" version="1" comment="librsvg-2-2 is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092036" version="1" comment="librsvg-2-2-32bit is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092037" version="1" comment="librsvg is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092038" version="1" comment="librsvg-devel is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092039" version="1" comment="rsvg-view is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092040" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.36.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091756" version="1" comment="nginx-1.0 is &lt;1.0.15-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091879" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091880" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091881" version="1" comment="subversion is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091882" version="1" comment="subversion-bash-completion is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091883" version="1" comment="subversion-devel is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091884" version="1" comment="subversion-perl is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091885" version="1" comment="subversion-python is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091886" version="1" comment="subversion-server is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091887" version="1" comment="subversion-tools is &lt;1.7.14-4.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091808" version="1" comment="ruby19 is &lt;1.9.3.p392-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091809" version="1" comment="ruby19-devel is &lt;1.9.3.p392-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091810" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091811" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091812" version="1" comment="ruby19-tk is &lt;1.9.3.p392-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091888" version="1" comment="curl is &lt;7.25.0-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091889" version="1" comment="libcurl-devel is &lt;7.25.0-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091890" version="1" comment="libcurl4-32bit is &lt;7.25.0-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091891" version="1" comment="libcurl4 is &lt;7.25.0-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091892" version="1" comment="nodejs is &lt;0.6.19-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091893" version="1" comment="nodejs-devel is &lt;0.6.19-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091894" version="1" comment="thttpd is &lt;2.25b-192.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091986" version="1" comment="ca-certificates-mozilla is &lt;1.95-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092239" version="1" comment="chromedriver is &lt;31.0.1650.63-1.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092240" version="1" comment="chromium is &lt;31.0.1650.63-1.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092241" version="1" comment="chromium-desktop-gnome is &lt;31.0.1650.63-1.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092242" version="1" comment="chromium-desktop-kde is &lt;31.0.1650.63-1.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092243" version="1" comment="chromium-ffmpegsumo is &lt;31.0.1650.63-1.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092244" version="1" comment="chromium-suid-helper is &lt;31.0.1650.63-1.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092002" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092003" version="1" comment="rubygem-actionpack-2_3-doc is &lt;2.3.17-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092004" version="1" comment="rubygem-actionpack-2_3-testsuite is &lt;2.3.17-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092005" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092006" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092041" version="1" comment="MozillaFirefox is &lt;26.0-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092042" version="1" comment="MozillaFirefox-branding-upstream is &lt;26.0-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092043" version="1" comment="MozillaFirefox-buildsymbols is &lt;26.0-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092044" version="1" comment="MozillaFirefox-devel is &lt;26.0-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092045" version="1" comment="MozillaFirefox-translations-common is &lt;26.0-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092046" version="1" comment="MozillaFirefox-translations-other is &lt;26.0-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092292" version="1" comment="MozillaThunderbird is &lt;24.2.0-49.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092293" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.2.0-49.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092294" version="1" comment="MozillaThunderbird-devel is &lt;24.2.0-49.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092295" version="1" comment="MozillaThunderbird-translations-common is &lt;24.2.0-49.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092296" version="1" comment="MozillaThunderbird-translations-other is &lt;24.2.0-49.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092297" version="1" comment="enigmail is &lt;1.6.0+24.2.0-49.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092889" version="1" comment="lighttpd is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092890" version="1" comment="lighttpd-mod_cml is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092891" version="1" comment="lighttpd-mod_geoip is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092892" version="1" comment="lighttpd-mod_magnet is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092893" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092894" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092895" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092896" version="1" comment="lighttpd-mod_webdav is &lt;1.4.31-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091938" version="1" comment="libfreebl3 is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091939" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091940" version="1" comment="libsoftokn3 is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091941" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091942" version="1" comment="mozilla-nss is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091943" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091944" version="1" comment="mozilla-nss-certs is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091945" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091946" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091947" version="1" comment="mozilla-nss-sysinit is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091948" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091949" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092245" version="1" comment="rubygem-i18n-0_6 is &lt;0.6.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092246" version="1" comment="rubygem-i18n-0_6-doc is &lt;0.6.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092247" version="1" comment="rubygem-i18n-0_6-testsuite is &lt;0.6.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092248" version="1" comment="openttd is &lt;1.2.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092249" version="1" comment="openttd-data is &lt;1.2.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092250" version="1" comment="openttd-dedicated is &lt;1.2.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092251" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092252" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.12-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092253" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092254" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.12-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092513" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-3.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092514" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-3.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092515" version="1" comment="seamonkey is &lt;2.23-2.58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092516" version="1" comment="seamonkey-dom-inspector is &lt;2.23-2.58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092517" version="1" comment="seamonkey-irc is &lt;2.23-2.58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092518" version="1" comment="seamonkey-translations-common is &lt;2.23-2.58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092519" version="1" comment="seamonkey-translations-other is &lt;2.23-2.58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092520" version="1" comment="seamonkey-venkman is &lt;2.23-2.58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092999" version="1" comment="libv8-3 is &lt;3.22.24.8-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093000" version="1" comment="v8 is &lt;3.22.24.8-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093001" version="1" comment="v8-devel is &lt;3.22.24.8-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093002" version="1" comment="v8-private-headers-devel is &lt;3.22.24.8-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092298" version="1" comment="webyast-base is &lt;0.3.19.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092299" version="1" comment="webyast-base-branding-default is &lt;0.3.19.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092300" version="1" comment="webyast-base-testsuite is &lt;0.3.19.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092301" version="1" comment="apache2-mod_php5 is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092302" version="1" comment="php5 is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092303" version="1" comment="php5-bcmath is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092304" version="1" comment="php5-bz2 is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092305" version="1" comment="php5-calendar is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092306" version="1" comment="php5-ctype is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092307" version="1" comment="php5-curl is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092308" version="1" comment="php5-dba is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092309" version="1" comment="php5-devel is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092310" version="1" comment="php5-dom is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092311" version="1" comment="php5-enchant is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092312" version="1" comment="php5-exif is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092313" version="1" comment="php5-fastcgi is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092314" version="1" comment="php5-fileinfo is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092315" version="1" comment="php5-fpm is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092316" version="1" comment="php5-ftp is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092317" version="1" comment="php5-gd is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092318" version="1" comment="php5-gettext is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092319" version="1" comment="php5-gmp is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092320" version="1" comment="php5-iconv is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092321" version="1" comment="php5-imap is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092322" version="1" comment="php5-intl is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092323" version="1" comment="php5-json is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092324" version="1" comment="php5-ldap is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092325" version="1" comment="php5-mbstring is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092326" version="1" comment="php5-mcrypt is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092327" version="1" comment="php5-mssql is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092328" version="1" comment="php5-mysql is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092329" version="1" comment="php5-odbc is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092330" version="1" comment="php5-openssl is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092331" version="1" comment="php5-pcntl is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092332" version="1" comment="php5-pdo is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092333" version="1" comment="php5-pear is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092334" version="1" comment="php5-pgsql is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092335" version="1" comment="php5-phar is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092336" version="1" comment="php5-posix is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092337" version="1" comment="php5-pspell is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092338" version="1" comment="php5-readline is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092339" version="1" comment="php5-shmop is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092340" version="1" comment="php5-snmp is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092341" version="1" comment="php5-soap is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092342" version="1" comment="php5-sockets is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092343" version="1" comment="php5-sqlite is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092344" version="1" comment="php5-suhosin is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092345" version="1" comment="php5-sysvmsg is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092346" version="1" comment="php5-sysvsem is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092347" version="1" comment="php5-sysvshm is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092348" version="1" comment="php5-tidy is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092349" version="1" comment="php5-tokenizer is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092350" version="1" comment="php5-wddx is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092351" version="1" comment="php5-xmlreader is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092352" version="1" comment="php5-xmlrpc is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092353" version="1" comment="php5-xmlwriter is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092354" version="1" comment="php5-xsl is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092355" version="1" comment="php5-zip is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092356" version="1" comment="php5-zlib is &lt;5.3.15-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092521" version="1" comment="wireshark is &lt;1.8.12-1.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092522" version="1" comment="wireshark-devel is &lt;1.8.12-1.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092357" version="1" comment="xorg-x11-Xvnc is &lt;7.6_1.12.3-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092358" version="1" comment="xorg-x11-server is &lt;7.6_1.12.3-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092359" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.12.3-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092360" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.12.3-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092523" version="1" comment="libpixman-1-0 is &lt;0.24.4-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092524" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092525" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092526" version="1" comment="pixman is &lt;0.24.4-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092527" version="1" comment="libopenssl-devel is &lt;1.0.1e-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092528" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092529" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092530" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092531" version="1" comment="openssl is &lt;1.0.1e-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092532" version="1" comment="openssl-doc is &lt;1.0.1e-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092533" version="1" comment="nagios is &lt;3.5.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092534" version="1" comment="nagios-devel is &lt;3.5.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092535" version="1" comment="nagios-www is &lt;3.5.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092536" version="1" comment="nagios-www-dch is &lt;3.5.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092702" version="1" comment="libopenssl-devel is &lt;1.0.1e-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092703" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092704" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092705" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092706" version="1" comment="openssl is &lt;1.0.1e-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092707" version="1" comment="openssl-doc is &lt;1.0.1e-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092897" version="1" comment="lightdm-gtk-greeter is &lt;1.1.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092898" version="1" comment="lightdm-gtk-greeter-branding-upstream is &lt;1.1.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092899" version="1" comment="lightdm-gtk-greeter-lang is &lt;1.1.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093003" version="1" comment="libopenssl-devel is &lt;1.0.1e-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093004" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093005" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093006" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093007" version="1" comment="openssl is &lt;1.0.1e-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093008" version="1" comment="openssl-doc is &lt;1.0.1e-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092900" version="1" comment="libqt4-devel-doc is &lt;4.8.1-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092901" version="1" comment="libqt4-devel-doc-data is &lt;4.8.1-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092902" version="1" comment="qt4-x11-tools is &lt;4.8.1-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092903" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092904" version="1" comment="libqt4-sql-mysql is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092905" version="1" comment="libqt4-sql-plugins is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092906" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092907" version="1" comment="libqt4-sql-postgresql is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092908" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092909" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092910" version="1" comment="libqt4-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092911" version="1" comment="libqt4 is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092912" version="1" comment="libqt4-devel is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092913" version="1" comment="libqt4-private-headers-devel is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092914" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092915" version="1" comment="libqt4-qt3support is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092916" version="1" comment="libqt4-sql-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092917" version="1" comment="libqt4-sql is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092918" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092919" version="1" comment="libqt4-sql-sqlite is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092920" version="1" comment="libqt4-x11-32bit is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092921" version="1" comment="libqt4-x11 is &lt;4.8.1-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092922" version="1" comment="libXfont is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092923" version="1" comment="libXfont-devel is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092924" version="1" comment="libXfont-devel-32bit is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092925" version="1" comment="libXfont1 is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092926" version="1" comment="libXfont1-32bit is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093109" version="1" comment="gnumeric is &lt;1.11.3-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093110" version="1" comment="gnumeric-devel is &lt;1.11.3-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093111" version="1" comment="gnumeric-lang is &lt;1.11.3-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093051" version="1" comment="cups is &lt;1.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093052" version="1" comment="cups-client is &lt;1.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093053" version="1" comment="cups-ddk is &lt;1.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093054" version="1" comment="cups-devel is &lt;1.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093055" version="1" comment="cups-libs is &lt;1.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093056" version="1" comment="cups-libs-32bit is &lt;1.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093057" version="1" comment="almanah is &lt;0.9.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093058" version="1" comment="almanah-lang is &lt;0.9.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093071" version="1" comment="hplip is &lt;3.12.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093072" version="1" comment="hplip-hpijs is &lt;3.12.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093073" version="1" comment="hplip-sane is &lt;3.12.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080687" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080688" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080689" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080690" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080691" version="1" comment="rubygem-activemodel-3_2 is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080692" version="1" comment="rubygem-activemodel-3_2-doc is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080693" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080694" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080695" version="1" comment="rubygem-activeresource-3_2 is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080696" version="1" comment="rubygem-activeresource-3_2-doc is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080697" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080698" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080699" version="1" comment="rubygem-journey-1_0 is &lt;1.0.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080700" version="1" comment="rubygem-journey-1_0-doc is &lt;1.0.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080701" version="1" comment="rubygem-journey-1_0-testsuite is &lt;1.0.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080702" version="1" comment="rubygem-rails-3_2 is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080703" version="1" comment="rubygem-rails-3_2-doc is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080704" version="1" comment="rubygem-railties-3_2 is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080705" version="1" comment="rubygem-railties-3_2-doc is &lt;3.2.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080706" version="1" comment="rubygem-sprockets-2_1 is &lt;2.1.3-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080707" version="1" comment="rubygem-sprockets-2_1-doc is &lt;2.1.3-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080708" version="1" comment="calligra-doc is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080709" version="1" comment="calligra is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080710" version="1" comment="calligra-braindump is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080714" version="1" comment="calligra-devel is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080715" version="1" comment="calligra-flow is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080717" version="1" comment="calligra-karbon is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080719" version="1" comment="calligra-kexi is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080721" version="1" comment="calligra-kexi-mssql-driver is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080723" version="1" comment="calligra-kexi-mysql-driver is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080725" version="1" comment="calligra-kexi-postgresql-driver is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080727" version="1" comment="calligra-kexi-spreadsheet-import is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080729" version="1" comment="calligra-kexi-xbase-driver is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080731" version="1" comment="calligra-krita is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080733" version="1" comment="calligra-kthesaurus is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080735" version="1" comment="calligra-plan is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080737" version="1" comment="calligra-sheets is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080739" version="1" comment="calligra-stage is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080741" version="1" comment="calligra-tools is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080743" version="1" comment="calligra-words is &lt;2.4.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080745" version="1" comment="libpcp-devel is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080747" version="1" comment="libpcp3 is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080749" version="1" comment="pcp is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080752" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080753" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080754" version="1" comment="pcp-import-sar2pcp is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080755" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080756" version="1" comment="perl-PCP-LogImport is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080758" version="1" comment="perl-PCP-LogSummary is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080759" version="1" comment="perl-PCP-MMV is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080761" version="1" comment="perl-PCP-PMDA is &lt;3.6.5-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080763" version="1" comment="wireshark is &lt;1.8.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080766" version="1" comment="wireshark-devel is &lt;1.8.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080767" version="1" comment="openttd is &lt;1.2.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080768" version="1" comment="openttd-data is &lt;1.2.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080770" version="1" comment="openttd-dedicated is &lt;1.2.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080772" version="1" comment="libupsclient1 is &lt;2.6.3-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080774" version="1" comment="nut is &lt;2.6.3-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080775" version="1" comment="nut-cgi is &lt;2.6.3-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080779" version="1" comment="nut-devel is &lt;2.6.3-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080780" version="1" comment="nut-drivers-net is &lt;2.6.3-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080782" version="1" comment="icinga is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080785" version="1" comment="icinga-devel is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080786" version="1" comment="icinga-doc is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080787" version="1" comment="icinga-idoutils is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080789" version="1" comment="icinga-idoutils-mysql is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080790" version="1" comment="icinga-idoutils-oracle is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080791" version="1" comment="icinga-idoutils-pgsql is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080792" version="1" comment="icinga-plugins-downtimes is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080793" version="1" comment="icinga-plugins-eventhandlers is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080794" version="1" comment="icinga-www is &lt;1.7.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080796" version="1" comment="nagios-rpm-macros is &lt;0.05-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080797" version="1" comment="phpMyAdmin is &lt;3.5.2.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080798" version="1" comment="tor is &lt;0.2.2.38-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080801" version="1" comment="otrs is &lt;3.1.9-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080802" version="1" comment="otrs-doc is &lt;3.1.9-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080803" version="1" comment="otrs-itsm is &lt;3.1.6-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080804" version="1" comment="gnome-keyring is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080807" version="1" comment="gnome-keyring-lang is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080808" version="1" comment="gnome-keyring-pam is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080809" version="1" comment="gnome-keyring-pam-32bit is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080812" version="1" comment="libgck-modules-gnome-keyring is &lt;3.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080814" version="1" comment="roundcubemail is &lt;0.8.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080815" version="1" comment="Mesa-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080816" version="1" comment="Mesa is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080820" version="1" comment="Mesa-devel-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080821" version="1" comment="Mesa-devel is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080822" version="1" comment="Mesa-libEGL-devel-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080823" version="1" comment="Mesa-libEGL-devel is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080824" version="1" comment="Mesa-libEGL1-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080825" version="1" comment="Mesa-libEGL1 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080828" version="1" comment="Mesa-libGL-devel-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080829" version="1" comment="Mesa-libGL-devel is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080830" version="1" comment="Mesa-libGL1-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080831" version="1" comment="Mesa-libGL1 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080834" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080835" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080836" version="1" comment="Mesa-libGLESv1_CM1-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080837" version="1" comment="Mesa-libGLESv1_CM1 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080840" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080841" version="1" comment="Mesa-libGLESv2-2 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080844" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080845" version="1" comment="Mesa-libGLESv2-devel is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080846" version="1" comment="Mesa-libGLU-devel-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080847" version="1" comment="Mesa-libGLU-devel is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080848" version="1" comment="Mesa-libGLU1-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080849" version="1" comment="Mesa-libGLU1 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080852" version="1" comment="Mesa-libIndirectGL1-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080853" version="1" comment="Mesa-libIndirectGL1 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080856" version="1" comment="Mesa-libglapi0-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080857" version="1" comment="Mesa-libglapi0 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080860" version="1" comment="libOSMesa8-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080861" version="1" comment="libOSMesa8 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080864" version="1" comment="libXvMC_nouveau-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080865" version="1" comment="libXvMC_nouveau is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080868" version="1" comment="libXvMC_r300-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080869" version="1" comment="libXvMC_r300 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080872" version="1" comment="libXvMC_r600-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080873" version="1" comment="libXvMC_r600 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080876" version="1" comment="libXvMC_softpipe-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080877" version="1" comment="libXvMC_softpipe is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080880" version="1" comment="libgbm-devel is &lt;0.0.0-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080881" version="1" comment="libgbm-devel-32bit is &lt;0.0.0-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080882" version="1" comment="libgbm1 is &lt;0.0.0-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080883" version="1" comment="libgbm1-32bit is &lt;0.0.0-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080886" version="1" comment="libvdpau_nouveau-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080887" version="1" comment="libvdpau_nouveau is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080890" version="1" comment="libvdpau_r300-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080891" version="1" comment="libvdpau_r300 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080894" version="1" comment="libvdpau_r600-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080895" version="1" comment="libvdpau_r600 is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080898" version="1" comment="libvdpau_softpipe-32bit is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080899" version="1" comment="libvdpau_softpipe is &lt;8.0.4-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080902" version="1" comment="libxatracker-devel is &lt;1.0.0-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080903" version="1" comment="libxatracker1 is &lt;1.0.0-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080905" version="1" comment="MozillaFirefox is &lt;15.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080906" version="1" comment="MozillaFirefox-branding-upstream is &lt;15.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080907" version="1" comment="MozillaFirefox-buildsymbols is &lt;15.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080910" version="1" comment="MozillaFirefox-devel is &lt;15.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080911" version="1" comment="MozillaFirefox-translations-common is &lt;15.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080912" version="1" comment="MozillaFirefox-translations-other is &lt;15.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080913" version="1" comment="MozillaThunderbird is &lt;15.0-49.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080914" version="1" comment="MozillaThunderbird-buildsymbols is &lt;15.0-49.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080917" version="1" comment="MozillaThunderbird-devel is &lt;15.0-49.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080919" version="1" comment="MozillaThunderbird-translations-common is &lt;15.0-49.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080920" version="1" comment="MozillaThunderbird-translations-other is &lt;15.0-49.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080921" version="1" comment="enigmail is &lt;1.4.4+15.0-49.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080923" version="1" comment="libfreebl3 is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080924" version="1" comment="libfreebl3-32bit is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080927" version="1" comment="libsoftokn3 is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080928" version="1" comment="libsoftokn3-32bit is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080931" version="1" comment="mozilla-nss is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080932" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080933" version="1" comment="mozilla-nss-certs is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080934" version="1" comment="mozilla-nss-certs-32bit is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080940" version="1" comment="mozilla-nss-devel is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080941" version="1" comment="mozilla-nss-sysinit is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080942" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080945" version="1" comment="mozilla-nss-tools is &lt;3.13.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080947" version="1" comment="seamonkey is &lt;2.12-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080950" version="1" comment="seamonkey-dom-inspector is &lt;2.12-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080951" version="1" comment="seamonkey-irc is &lt;2.12-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080952" version="1" comment="seamonkey-translations-common is &lt;2.12-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080953" version="1" comment="seamonkey-translations-other is &lt;2.12-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080954" version="1" comment="seamonkey-venkman is &lt;2.12-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080955" version="1" comment="mozilla-js is &lt;15.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080956" version="1" comment="mozilla-js-32bit is &lt;15.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080959" version="1" comment="xulrunner is &lt;15.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080960" version="1" comment="xulrunner-32bit is &lt;15.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080961" version="1" comment="xulrunner-buildsymbols is &lt;15.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080965" version="1" comment="xulrunner-devel is &lt;15.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080967" version="1" comment="apache2-mod_php5 is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080969" version="1" comment="php5 is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080970" version="1" comment="php5-bcmath is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080972" version="1" comment="php5-bz2 is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080974" version="1" comment="php5-calendar is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080976" version="1" comment="php5-ctype is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080978" version="1" comment="php5-curl is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080980" version="1" comment="php5-dba is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080984" version="1" comment="php5-devel is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080985" version="1" comment="php5-dom is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080987" version="1" comment="php5-enchant is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080989" version="1" comment="php5-exif is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080991" version="1" comment="php5-fastcgi is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080993" version="1" comment="php5-fileinfo is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080995" version="1" comment="php5-fpm is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080997" version="1" comment="php5-ftp is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080999" version="1" comment="php5-gd is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081001" version="1" comment="php5-gettext is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081003" version="1" comment="php5-gmp is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081005" version="1" comment="php5-iconv is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081007" version="1" comment="php5-imap is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081009" version="1" comment="php5-intl is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081011" version="1" comment="php5-json is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081013" version="1" comment="php5-ldap is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081015" version="1" comment="php5-mbstring is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081017" version="1" comment="php5-mcrypt is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081019" version="1" comment="php5-mssql is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081021" version="1" comment="php5-mysql is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081023" version="1" comment="php5-odbc is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081025" version="1" comment="php5-openssl is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081027" version="1" comment="php5-pcntl is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081029" version="1" comment="php5-pdo is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081031" version="1" comment="php5-pear is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081032" version="1" comment="php5-pgsql is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081034" version="1" comment="php5-phar is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081036" version="1" comment="php5-posix is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081038" version="1" comment="php5-pspell is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081040" version="1" comment="php5-readline is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081042" version="1" comment="php5-shmop is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081044" version="1" comment="php5-snmp is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081046" version="1" comment="php5-soap is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081048" version="1" comment="php5-sockets is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081050" version="1" comment="php5-sqlite is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081052" version="1" comment="php5-suhosin is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081054" version="1" comment="php5-sysvmsg is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081056" version="1" comment="php5-sysvsem is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081058" version="1" comment="php5-sysvshm is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081060" version="1" comment="php5-tidy is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081062" version="1" comment="php5-tokenizer is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081064" version="1" comment="php5-wddx is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081066" version="1" comment="php5-xmlreader is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081068" version="1" comment="php5-xmlrpc is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081070" version="1" comment="php5-xmlwriter is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081072" version="1" comment="php5-xsl is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081074" version="1" comment="php5-zip is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081076" version="1" comment="php5-zlib is &lt;5.3.15-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081078" version="1" comment="gimp is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081079" version="1" comment="gimp-branding-upstream is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081082" version="1" comment="gimp-devel is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081084" version="1" comment="gimp-help-browser is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081086" version="1" comment="gimp-lang is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081087" version="1" comment="gimp-plugins-python is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081089" version="1" comment="libgimp-2_0-0 is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081090" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081093" version="1" comment="libgimpui-2_0-0 is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081094" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081097" version="1" comment="chromedriver is &lt;23.0.1255.0-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081099" version="1" comment="chromium is &lt;23.0.1255.0-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081102" version="1" comment="chromium-desktop-gnome is &lt;23.0.1255.0-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081103" version="1" comment="chromium-desktop-kde is &lt;23.0.1255.0-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081104" version="1" comment="chromium-suid-helper is &lt;23.0.1255.0-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081106" version="1" comment="inn is &lt;2.5.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081109" version="1" comment="inn-devel is &lt;2.5.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081110" version="1" comment="mininews is &lt;2.5.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081112" version="1" comment="kvm is &lt;1.1.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081113" version="1" comment="xen is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081115" version="1" comment="xen-devel is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081116" version="1" comment="xen-kmp-default is &lt;4.1.3_01_k3.4.6_2.10-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081118" version="1" comment="xen-kmp-desktop is &lt;4.1.3_01_k3.4.6_2.10-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081120" version="1" comment="xen-kmp-pae is &lt;4.1.3_01_k3.4.6_2.10-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081122" version="1" comment="xen-libs-32bit is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081123" version="1" comment="xen-libs is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081126" version="1" comment="xen-tools-domU is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081128" version="1" comment="xen-doc-html is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081129" version="1" comment="xen-doc-pdf is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081130" version="1" comment="xen-tools is &lt;4.1.3_01-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081132" version="1" comment="qemu is &lt;1.1.1-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081135" version="1" comment="qemu-guest-agent is &lt;1.1.1-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081137" version="1" comment="qemu-linux-user is &lt;1.1.1-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081138" version="1" comment="qemu-tools is &lt;1.1.1-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081140" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081143" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081145" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081147" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081148" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081149" version="1" comment="libecpg6 is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081151" version="1" comment="libpq5-32bit is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081152" version="1" comment="libpq5 is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081155" version="1" comment="postgresql-devel-32bit is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081156" version="1" comment="postgresql-devel is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081159" version="1" comment="postgresql-libs is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081161" version="1" comment="postgresql is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081162" version="1" comment="postgresql-contrib is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081166" version="1" comment="postgresql-docs is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081167" version="1" comment="postgresql-plperl is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081169" version="1" comment="postgresql-plpython is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081171" version="1" comment="postgresql-pltcl is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081173" version="1" comment="postgresql-server is &lt;9.1.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081175" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-2.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081176" version="1" comment="rubygem-actionpack-2_3-doc is &lt;2.3.14-2.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081177" version="1" comment="rubygem-actionpack-2_3-testsuite is &lt;2.3.14-2.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081178" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081179" version="1" comment="rubygem-activesupport-2_3-doc is &lt;2.3.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081180" version="1" comment="freeradius-server is &lt;2.1.12-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081183" version="1" comment="freeradius-server-devel is &lt;2.1.12-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081184" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.12-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081185" version="1" comment="freeradius-server-doc is &lt;2.1.12-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081186" version="1" comment="freeradius-server-libs is &lt;2.1.12-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081188" version="1" comment="freeradius-server-utils is &lt;2.1.12-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081190" version="1" comment="otrs is &lt;3.1.10-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081191" version="1" comment="otrs-doc is &lt;3.1.10-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081192" version="1" comment="otrs-itsm is &lt;3.1.6-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081193" version="1" comment="bind is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081194" version="1" comment="bind-chrootenv is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081197" version="1" comment="bind-devel is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081198" version="1" comment="bind-doc is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081199" version="1" comment="bind-libs-32bit is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081200" version="1" comment="bind-libs is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081203" version="1" comment="bind-lwresd is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081205" version="1" comment="bind-utils is &lt;9.9.1P3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081207" version="1" comment="mcrypt is &lt;2.6.8-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081210" version="1" comment="deb is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081213" version="1" comment="deb-devel is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081214" version="1" comment="deb-lang is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081215" version="1" comment="update-alternatives is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081218" version="1" comment="tor is &lt;0.2.2.39-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081221" version="1" comment="dhcp is &lt;4.2.4.P2-0.1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081222" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081226" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081227" version="1" comment="dhcp-doc is &lt;4.2.4.P2-0.1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081228" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081230" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081232" version="1" comment="libecpg6 is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081234" version="1" comment="libpq5-32bit is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081235" version="1" comment="libpq5 is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081238" version="1" comment="postgresql-devel-32bit is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081239" version="1" comment="postgresql-devel is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081242" version="1" comment="postgresql-libs is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081244" version="1" comment="postgresql is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081245" version="1" comment="postgresql-contrib is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081249" version="1" comment="postgresql-docs is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081250" version="1" comment="postgresql-plperl is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081252" version="1" comment="postgresql-plpython is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081254" version="1" comment="postgresql-pltcl is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081256" version="1" comment="postgresql-server is &lt;9.1.5-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081258" version="1" comment="ddskk is &lt;20121010_14.4-283.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081259" version="1" comment="skkdic is &lt;20121010_14.4-283.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081260" version="1" comment="skkdic-extra is &lt;20121010_14.4-283.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081261" version="1" comment="emacs-w3 is &lt;cvs-808.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081262" version="1" comment="emacs is &lt;24.2-15.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081265" version="1" comment="emacs-el is &lt;24.2-15.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081266" version="1" comment="emacs-info is &lt;24.2-15.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081267" version="1" comment="emacs-nox is &lt;24.2-15.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081268" version="1" comment="emacs-x11 is &lt;24.2-15.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081269" version="1" comment="gnuplot is &lt;4.6.0-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081272" version="1" comment="gnuplot-doc is &lt;4.6.0-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081273" version="1" comment="dbus-1-x11 is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081276" version="1" comment="dbus-1 is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081277" version="1" comment="dbus-1-32bit is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081281" version="1" comment="dbus-1-devel is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081282" version="1" comment="dbus-1-devel-32bit is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081283" version="1" comment="dbus-1-devel-doc is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081284" version="1" comment="libdbus-1-3 is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081285" version="1" comment="libdbus-1-3-32bit is &lt;1.5.12-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081288" version="1" comment="python-virtualbox is &lt;4.1.22-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081290" version="1" comment="virtualbox is &lt;4.1.22-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081293" version="1" comment="virtualbox-devel is &lt;4.1.22-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081294" version="1" comment="virtualbox-guest-kmp-default is &lt;4.1.22_k3.4.6_2.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081296" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.1.22_k3.4.6_2.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081298" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.1.22_k3.4.6_2.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081300" version="1" comment="virtualbox-guest-tools is &lt;4.1.22-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081302" version="1" comment="virtualbox-guest-x11 is &lt;4.1.22-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081304" version="1" comment="virtualbox-host-kmp-default is &lt;4.1.22_k3.4.6_2.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081306" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.1.22_k3.4.6_2.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081308" version="1" comment="virtualbox-host-kmp-pae is &lt;4.1.22_k3.4.6_2.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081310" version="1" comment="virtualbox-qt is &lt;4.1.22-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081312" version="1" comment="virtualbox-websrv is &lt;4.1.22-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081314" version="1" comment="kernel-debug is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081315" version="1" comment="kernel-debug-base is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081319" version="1" comment="kernel-debug-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081321" version="1" comment="kernel-default is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081322" version="1" comment="kernel-default-base is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081326" version="1" comment="kernel-default-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081328" version="1" comment="kernel-desktop is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081329" version="1" comment="kernel-desktop-base is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081333" version="1" comment="kernel-desktop-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081335" version="1" comment="kernel-docs is &lt;3.4.11-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081336" version="1" comment="kernel-ec2 is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081337" version="1" comment="kernel-ec2-base is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081341" version="1" comment="kernel-ec2-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081343" version="1" comment="kernel-ec2-extra is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081345" version="1" comment="kernel-pae is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081346" version="1" comment="kernel-pae-base is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081350" version="1" comment="kernel-pae-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081352" version="1" comment="kernel-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081353" version="1" comment="kernel-source is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081354" version="1" comment="kernel-source-vanilla is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081355" version="1" comment="kernel-syms is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081356" version="1" comment="kernel-trace is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081357" version="1" comment="kernel-trace-base is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081361" version="1" comment="kernel-trace-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081363" version="1" comment="kernel-vanilla is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081366" version="1" comment="kernel-vanilla-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081368" version="1" comment="kernel-xen is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081369" version="1" comment="kernel-xen-base is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081373" version="1" comment="kernel-xen-devel is &lt;3.4.11-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081375" version="1" comment="optipng is &lt;0.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081378" version="1" comment="wireshark is &lt;1.8.3-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081381" version="1" comment="wireshark-devel is &lt;1.8.3-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081382" version="1" comment="MozillaFirefox is &lt;16.0.1-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081383" version="1" comment="MozillaFirefox-branding-upstream is &lt;16.0.1-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081384" version="1" comment="MozillaFirefox-buildsymbols is &lt;16.0.1-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081387" version="1" comment="MozillaFirefox-devel is &lt;16.0.1-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081388" version="1" comment="MozillaFirefox-translations-common is &lt;16.0.1-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081389" version="1" comment="MozillaFirefox-translations-other is &lt;16.0.1-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081390" version="1" comment="MozillaThunderbird is &lt;16.0.1-49.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081391" version="1" comment="MozillaThunderbird-buildsymbols is &lt;16.0.1-49.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081394" version="1" comment="MozillaThunderbird-devel is &lt;16.0.1-49.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081396" version="1" comment="MozillaThunderbird-translations-common is &lt;16.0.1-49.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081397" version="1" comment="MozillaThunderbird-translations-other is &lt;16.0.1-49.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081398" version="1" comment="enigmail is &lt;1.4.5.+16.0.1-49.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081400" version="1" comment="mozilla-kde4-integration is &lt;0.6.4-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081403" version="1" comment="seamonkey is &lt;2.13.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081406" version="1" comment="seamonkey-dom-inspector is &lt;2.13.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081407" version="1" comment="seamonkey-irc is &lt;2.13.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081408" version="1" comment="seamonkey-translations-common is &lt;2.13.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081409" version="1" comment="seamonkey-translations-other is &lt;2.13.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081410" version="1" comment="seamonkey-venkman is &lt;2.13.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081411" version="1" comment="mozilla-js is &lt;16.0.1-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081412" version="1" comment="mozilla-js-32bit is &lt;16.0.1-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081415" version="1" comment="xulrunner is &lt;16.0.1-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081416" version="1" comment="xulrunner-32bit is &lt;16.0.1-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081417" version="1" comment="xulrunner-buildsymbols is &lt;16.0.1-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081421" version="1" comment="xulrunner-devel is &lt;16.0.1-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081423" version="1" comment="hostapd is &lt;1.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081426" version="1" comment="libopenjpeg1 is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081427" version="1" comment="libopenjpeg1-32bit is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081430" version="1" comment="openjpeg is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081433" version="1" comment="openjpeg-devel is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081434" version="1" comment="openjpeg-devel-32bit is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081435" version="1" comment="chromedriver is &lt;24.0.1290.0-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081437" version="1" comment="chromium is &lt;24.0.1290.0-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081440" version="1" comment="chromium-desktop-gnome is &lt;24.0.1290.0-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081441" version="1" comment="chromium-desktop-kde is &lt;24.0.1290.0-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081442" version="1" comment="chromium-suid-helper is &lt;24.0.1290.0-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081444" version="1" comment="bind is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081445" version="1" comment="bind-chrootenv is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081448" version="1" comment="bind-devel is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081449" version="1" comment="bind-doc is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081450" version="1" comment="bind-libs-32bit is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081451" version="1" comment="bind-libs is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081454" version="1" comment="bind-lwresd is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081456" version="1" comment="bind-utils is &lt;9.9.1P4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081458" version="1" comment="libproxy is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081460" version="1" comment="libproxy-devel is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081461" version="1" comment="libproxy-sharp is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081462" version="1" comment="libproxy-tools is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081464" version="1" comment="libproxy1 is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081465" version="1" comment="libproxy1-32bit is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081468" version="1" comment="perl-Net-Libproxy is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081470" version="1" comment="python-libproxy is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081471" version="1" comment="libproxy-plugins is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081473" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081475" version="1" comment="libproxy1-config-kde4 is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081477" version="1" comment="libproxy1-networkmanager is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081479" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.7-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081481" version="1" comment="otrs is &lt;3.1.11-20.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081482" version="1" comment="otrs-doc is &lt;3.1.11-20.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081483" version="1" comment="otrs-itsm is &lt;3.1.6-20.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081484" version="1" comment="libtiff-devel-32bit is &lt;4.0.2-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081485" version="1" comment="libtiff-devel is &lt;4.0.2-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081486" version="1" comment="libtiff5-32bit is &lt;4.0.2-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081487" version="1" comment="libtiff5 is &lt;4.0.2-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081490" version="1" comment="tiff is &lt;4.0.2-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041435"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-crystal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-hicontrast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be-BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-cim-client2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-cim-client2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-cim-client2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde4-imp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde4-kronolith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-browser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-ffmpegsumo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-suid-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-debug-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-debug-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-downtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-eventhandlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie-anacron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libv8-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-itk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-qtscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_1-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_2-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-2_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-skencil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blender-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chmsee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-devise</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-devise-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-devise-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitPlugin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-remote-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-superserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-sdt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pam-ldapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pam-ldapd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble-xmpp-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLU-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLU-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLU1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLU1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_softpipe-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_softpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_softpipe-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_softpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ikev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ikev2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libautotrace3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>darktable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www-dch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Signature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagstamon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-plasma-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-plasma-engine-akonadi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-kdebase4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_2mu1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_2mu1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-2to3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-analyze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclutter-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclutter-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Clutter-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SpiceClientGtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zenmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-svg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-1.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates-mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-0_6-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-0_6-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-dedicated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base-branding-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-journey-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-journey-1_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-journey-1_0-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-braindump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-flow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-karbon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-kexi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-kexi-mssql-driver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-kexi-mysql-driver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-kexi-postgresql-driver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-kexi-spreadsheet-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-kexi-xbase-driver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-krita</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-kthesaurus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-plan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-sheets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-stage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calligra-words</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sheet2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mininews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deb-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ddskk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skkdic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skkdic-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-w3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>optipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-kde4-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.12-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-1.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.80.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0.2-14.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.2-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.2-49.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5.+16.0.2-49.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.2-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.2-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p194-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-76.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-1.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-1.4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-1.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_k3.4.11_2.16-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0-49.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.6+17.0-49.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.31-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.24-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.2.39-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.1343.0-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8+git20120223-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_k3.4.11_2.16-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.2P1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.1362.0-1.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.27-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.28-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.28a-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.27-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.0-2.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.2-49.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0+17.0.2-49.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-2.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.2-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-37.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-37.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:26.0.1383.0-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.22-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.22_k3.4.11_2.16-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.16-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4.0-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.18-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-2.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-2.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-2.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-3.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-2.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-2.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-2.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-48.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-48.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.11.9-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48.3.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.63a-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.5-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.8-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.0-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.3-49.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.3-49.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-2.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16-2.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.3-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p385-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.4-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.10.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.33-2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.33-2.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5p2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:27.0.1425.0-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.0.2-2.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4-2.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-30.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.16.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4-49.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.4-49.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.60-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.13-11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8+git20120223-8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.21-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.6.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.15-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.6-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.7-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.2P2-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_k3.4.33_2.24-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.0-2.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5-49.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.5-49.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-2.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.9-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.9-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.25.0-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.4-20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0-20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8+git20120223-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.42-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.42-2.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.12.3-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.4-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.11-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.8-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-48.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-48.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.0-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6-49.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.6-49.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6-2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.47-2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.47-2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.10-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31.1-635.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.25.0-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.0-2.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7-49.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.7-49.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7-2.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.12.3-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0.1553.0-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.73-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.4-20.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0-20.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-20.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8+git20120223-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.15-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.11-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.27-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-14.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.32-1.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.4-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-48.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.13.0-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:23.0-2.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8-49.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2+17.0.8-49.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.1-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-2.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8-2.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.2P2-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.20.0-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8b-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_04-5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_04_k3.4.47_2.38-5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.3-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE9-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.13-4.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0-49.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2+24.0-49.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.21-2.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.63-2.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.63-2.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10_git201107141740-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.11.9-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0.1599.66-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4d-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.01-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-112.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.12.3-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_01-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_01_k3.4.47_2.38-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0-2.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.1.0-49.59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.1.0-49.59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10-2.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0.1599.114-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-48.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-2.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0.1650.57-1.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.4-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.36.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.14-4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.25.0-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.19-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25b-192.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0.1650.63-1.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:26.0-2.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.2.0-49.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.2.0-49.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.31-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-3.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23-2.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.24.8-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.19.1-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.15-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-1.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.12.3-1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.3-2.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.4-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.5-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.05-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.2.2-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.2.38-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.9-20.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6-20.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.4-20.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0-20.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-20.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.0-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.0-49.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4+15.0-49.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.6-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.0-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.15-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:23.0.1255.0-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_01-5.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_01_k3.4.6_2.10-5.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.3-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-20.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6-20.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.1P3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.2.39-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.5-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20121010_14.4-283.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:cvs-808.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.2-15.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.12-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.22-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.22_k3.4.6_2.10-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.11-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.11-2.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.1-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.1-49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5.+16.0.1-49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.4-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.1-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.1-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.1290.0-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.1P4-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-14.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-20.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6-20.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.12.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
