summaryrefslogtreecommitdiffstats
path: root/libxml2/test/schemas
diff options
context:
space:
mode:
authorWilliam Joye <wjoye@cfa.harvard.edu>2017-05-03 15:29:42 (GMT)
committerWilliam Joye <wjoye@cfa.harvard.edu>2017-05-03 15:29:42 (GMT)
commit937cfaf1a06a4a9d0c8ba119d7ce820878ff9058 (patch)
treef7b0b1bcce9ae963a0a069eafa552350eb4ee391 /libxml2/test/schemas
parent4b8453f0303492a1de2dcf854555f6429fac550e (diff)
downloadblt-937cfaf1a06a4a9d0c8ba119d7ce820878ff9058.zip
blt-937cfaf1a06a4a9d0c8ba119d7ce820878ff9058.tar.gz
blt-937cfaf1a06a4a9d0c8ba119d7ce820878ff9058.tar.bz2
inital commit
Diffstat (limited to 'libxml2/test/schemas')
-rw-r--r--libxml2/test/schemas/570702_0.xml13
-rw-r--r--libxml2/test/schemas/570702_0.xsd25
-rw-r--r--libxml2/test/schemas/579746_0.xml3
-rw-r--r--libxml2/test/schemas/579746_0.xsd11
-rw-r--r--libxml2/test/schemas/579746_1.xml4
-rw-r--r--libxml2/test/schemas/579746_1.xsd10
-rw-r--r--libxml2/test/schemas/579746_2.xml5
-rw-r--r--libxml2/test/schemas/579746_3.xml7
-rw-r--r--libxml2/test/schemas/579746_4.xml5
-rw-r--r--libxml2/test/schemas/579746_5.xml6
-rw-r--r--libxml2/test/schemas/582887-attribute.xsd12
-rw-r--r--libxml2/test/schemas/582887-common.xsd8
-rw-r--r--libxml2/test/schemas/582887-element.xsd11
-rw-r--r--libxml2/test/schemas/582887_0.xml7
-rw-r--r--libxml2/test/schemas/582887_0.xsd17
-rw-r--r--libxml2/test/schemas/582906-1-common.xsd6
-rw-r--r--libxml2/test/schemas/582906-1-prog1.xsd11
-rw-r--r--libxml2/test/schemas/582906-1-prog2-include.xsd9
-rw-r--r--libxml2/test/schemas/582906-1-prog2.xsd13
-rw-r--r--libxml2/test/schemas/582906-1_0.xml5
-rw-r--r--libxml2/test/schemas/582906-1_0.xsd20
-rw-r--r--libxml2/test/schemas/582906-2-common.xsd7
-rw-r--r--libxml2/test/schemas/582906-2-prog1.xsd11
-rw-r--r--libxml2/test/schemas/582906-2-prog2-include.xsd9
-rw-r--r--libxml2/test/schemas/582906-2-prog2.xsd13
-rw-r--r--libxml2/test/schemas/582906-2_0.xml5
-rw-r--r--libxml2/test/schemas/582906-2_0.xsd20
-rw-r--r--libxml2/test/schemas/all.xsd16
-rw-r--r--libxml2/test/schemas/all1_0.xml4
-rw-r--r--libxml2/test/schemas/all1_0.xsd10
-rw-r--r--libxml2/test/schemas/all_0.xml1
-rw-r--r--libxml2/test/schemas/all_0.xsd12
-rw-r--r--libxml2/test/schemas/all_1.xml2
-rw-r--r--libxml2/test/schemas/all_1.xsd12
-rw-r--r--libxml2/test/schemas/all_2.xml1
-rw-r--r--libxml2/test/schemas/all_2.xsd11
-rw-r--r--libxml2/test/schemas/all_3.xml1
-rw-r--r--libxml2/test/schemas/all_4.xml1
-rw-r--r--libxml2/test/schemas/all_5.xml1
-rw-r--r--libxml2/test/schemas/all_6.xml1
-rw-r--r--libxml2/test/schemas/all_7.xml1
-rw-r--r--libxml2/test/schemas/allsg_0.xml7
-rw-r--r--libxml2/test/schemas/allsg_0.xsd26
-rw-r--r--libxml2/test/schemas/allsg_1.xml8
-rw-r--r--libxml2/test/schemas/allsg_2.xml8
-rw-r--r--libxml2/test/schemas/allsg_3.xml7
-rw-r--r--libxml2/test/schemas/allsg_4.xml7
-rw-r--r--libxml2/test/schemas/allsg_5.xml8
-rw-r--r--libxml2/test/schemas/annot-err_0.xml4
-rw-r--r--libxml2/test/schemas/annot-err_0.xsd21
-rw-r--r--libxml2/test/schemas/any1_0.xml21
-rw-r--r--libxml2/test/schemas/any1_0.xsd22
-rw-r--r--libxml2/test/schemas/any2_0.xml24
-rw-r--r--libxml2/test/schemas/any2_0.xsd26
-rw-r--r--libxml2/test/schemas/any3_0.xml17
-rw-r--r--libxml2/test/schemas/any3_0.xsd17
-rw-r--r--libxml2/test/schemas/any4_0.xml17
-rw-r--r--libxml2/test/schemas/any4_0.xsd28
-rw-r--r--libxml2/test/schemas/any5_0.xml7
-rw-r--r--libxml2/test/schemas/any5_0.xsd13
-rw-r--r--libxml2/test/schemas/any5_1.xml12
-rw-r--r--libxml2/test/schemas/any5_1.xsd14
-rw-r--r--libxml2/test/schemas/any5_2.xml8
-rw-r--r--libxml2/test/schemas/any5_3.xml11
-rw-r--r--libxml2/test/schemas/any5_4.xml12
-rw-r--r--libxml2/test/schemas/any5_5.xml12
-rw-r--r--libxml2/test/schemas/any5_6.xml13
-rwxr-xr-xlibxml2/test/schemas/any6_0.xml8
-rw-r--r--libxml2/test/schemas/any6_1.xsd36
-rw-r--r--libxml2/test/schemas/any6_2.xsd19
-rwxr-xr-xlibxml2/test/schemas/any7_0.xml19
-rwxr-xr-xlibxml2/test/schemas/any7_1.xml18
-rwxr-xr-xlibxml2/test/schemas/any7_1.xsd13
-rw-r--r--libxml2/test/schemas/any7_2.xml20
-rwxr-xr-xlibxml2/test/schemas/any7_2.xsd13
-rw-r--r--libxml2/test/schemas/any8_0.xml9
-rw-r--r--libxml2/test/schemas/any8_1.xsd20
-rw-r--r--libxml2/test/schemas/anyAttr-derive-errors1_0.xml30
-rw-r--r--libxml2/test/schemas/anyAttr-derive-errors1_0.xsd223
-rw-r--r--libxml2/test/schemas/anyAttr-derive1_0.xml30
-rw-r--r--libxml2/test/schemas/anyAttr-derive1_0.xsd227
-rw-r--r--libxml2/test/schemas/anyAttr-derive2_0.xml9
-rw-r--r--libxml2/test/schemas/anyAttr-derive2_0.xsd33
-rw-r--r--libxml2/test/schemas/anyAttr-errors1_0.xml26
-rw-r--r--libxml2/test/schemas/anyAttr-processContents-err1_0.xml11
-rw-r--r--libxml2/test/schemas/anyAttr-processContents-err1_0.xsd26
-rw-r--r--libxml2/test/schemas/anyAttr-processContents1_0.xml13
-rw-r--r--libxml2/test/schemas/anyAttr-processContents1_0.xsd32
-rw-r--r--libxml2/test/schemas/anyAttr.importA.1_0.xsd24
-rw-r--r--libxml2/test/schemas/anyAttr.importB.1_0.xsd21
-rw-r--r--libxml2/test/schemas/anyAttr1_0.xml31
-rw-r--r--libxml2/test/schemas/anyAttr1_0.xsd144
-rw-r--r--libxml2/test/schemas/attr0_0.xml1
-rw-r--r--libxml2/test/schemas/attr0_0.xsd13
-rw-r--r--libxml2/test/schemas/attruse_0_0.xml8
-rw-r--r--libxml2/test/schemas/attruse_0_0.xsd32
-rw-r--r--libxml2/test/schemas/attruse_0_1.xml8
-rw-r--r--libxml2/test/schemas/attruse_0_2.xml8
-rw-r--r--libxml2/test/schemas/bug141312_0.xml2
-rw-r--r--libxml2/test/schemas/bug141312_0.xsd16
-rw-r--r--libxml2/test/schemas/bug141333.xml9
-rw-r--r--libxml2/test/schemas/bug141333.xsd25
-rw-r--r--libxml2/test/schemas/bug141333_0.xml9
-rw-r--r--libxml2/test/schemas/bug141333_0.xsd25
-rw-r--r--libxml2/test/schemas/bug143951.imp12
-rw-r--r--libxml2/test/schemas/bug143951_0.xml9
-rw-r--r--libxml2/test/schemas/bug143951_0.xsd17
-rw-r--r--libxml2/test/schemas/bug145246.xsd.imp119
-rw-r--r--libxml2/test/schemas/bug145246_0.xml30
-rw-r--r--libxml2/test/schemas/bug145246_0.xsd173
-rwxr-xr-xlibxml2/test/schemas/bug152470_1.xml9
-rwxr-xr-xlibxml2/test/schemas/bug152470_1.xsd49
-rw-r--r--libxml2/test/schemas/bug167754_0.xml12
-rw-r--r--libxml2/test/schemas/bug167754_0.xsd29
-rw-r--r--libxml2/test/schemas/bug303566_1.xml19
-rw-r--r--libxml2/test/schemas/bug303566_1.xsd63
-rw-r--r--libxml2/test/schemas/bug306806_0.xml111
-rw-r--r--libxml2/test/schemas/bug306806_1.xsd544
-rw-r--r--libxml2/test/schemas/bug309338_0.xml4
-rw-r--r--libxml2/test/schemas/bug309338_1.xsd13
-rw-r--r--libxml2/test/schemas/bug310264_0.xml41
-rw-r--r--libxml2/test/schemas/bug310264_0.xsd18
-rw-r--r--libxml2/test/schemas/bug312957_0.xml14
-rw-r--r--libxml2/test/schemas/bug312957_1.xsd39
-rw-r--r--libxml2/test/schemas/bug313982_0.xml4
-rw-r--r--libxml2/test/schemas/bug313982_0.xsd11
-rw-r--r--libxml2/test/schemas/bug321475_0.xml10
-rw-r--r--libxml2/test/schemas/bug321475_1.xsd48
-rw-r--r--libxml2/test/schemas/bug322411_0.xml93
-rw-r--r--libxml2/test/schemas/bug322411_1.xsd35
-rw-r--r--libxml2/test/schemas/bug323510_0.xml3
-rw-r--r--libxml2/test/schemas/bug323510_1.xsd12
-rw-r--r--libxml2/test/schemas/bug455953_0.xml9
-rw-r--r--libxml2/test/schemas/bug455953_0.xsd29
-rw-r--r--libxml2/test/schemas/changelog093_0.xml14
-rw-r--r--libxml2/test/schemas/changelog093_1.xsd253
-rw-r--r--libxml2/test/schemas/choice_0.xml3
-rw-r--r--libxml2/test/schemas/choice_0.xsd13
-rw-r--r--libxml2/test/schemas/choice_1.xml3
-rw-r--r--libxml2/test/schemas/choice_1.xsd13
-rw-r--r--libxml2/test/schemas/choice_2.xml4
-rw-r--r--libxml2/test/schemas/choice_2.xsd13
-rw-r--r--libxml2/test/schemas/choice_3.xml4
-rw-r--r--libxml2/test/schemas/choice_4.xml2
-rw-r--r--libxml2/test/schemas/choice_5.xml6
-rw-r--r--libxml2/test/schemas/choice_6.xml7
-rw-r--r--libxml2/test/schemas/complex-type-extension_0.xml12
-rw-r--r--libxml2/test/schemas/complex-type-extension_0.xsd27
-rw-r--r--libxml2/test/schemas/cos-ct-extends-1-3_0.xml9
-rw-r--r--libxml2/test/schemas/cos-ct-extends-1-3_0.xsd51
-rw-r--r--libxml2/test/schemas/cos-st-restricts-1-2-err_0.xml3
-rw-r--r--libxml2/test/schemas/cos-st-restricts-1-2-err_0.xsd30
-rw-r--r--libxml2/test/schemas/ct-sc-nobase_0.xml4
-rw-r--r--libxml2/test/schemas/ct-sc-nobase_0.xsd24
-rw-r--r--libxml2/test/schemas/date_0.xml26
-rw-r--r--libxml2/test/schemas/date_0.xsd122
-rw-r--r--libxml2/test/schemas/decimal-1.xml37
-rw-r--r--libxml2/test/schemas/decimal-1.xsd29
-rw-r--r--libxml2/test/schemas/decimal-1_0.xml24
-rw-r--r--libxml2/test/schemas/decimal-1_1.xsd19
-rw-r--r--libxml2/test/schemas/decimal-2_0.xml14
-rw-r--r--libxml2/test/schemas/decimal-2_1.xsd18
-rw-r--r--libxml2/test/schemas/decimal-3_0.xml17
-rw-r--r--libxml2/test/schemas/decimal-3_1.xsd18
-rw-r--r--libxml2/test/schemas/derivation-ok-extension-err_0.xml9
-rw-r--r--libxml2/test/schemas/derivation-ok-extension-err_0.xsd22
-rw-r--r--libxml2/test/schemas/derivation-ok-extension_0.xml9
-rw-r--r--libxml2/test/schemas/derivation-ok-extension_0.xsd22
-rw-r--r--libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xml8
-rw-r--r--libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xsd56
-rw-r--r--libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xml8
-rw-r--r--libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xsd69
-rw-r--r--libxml2/test/schemas/derivation-restriction-anyAttr_0.xml12
-rw-r--r--libxml2/test/schemas/derivation-restriction-anyAttr_0.xsd24
-rw-r--r--libxml2/test/schemas/derivation-restriction-anyType.xml9
-rw-r--r--libxml2/test/schemas/derivation-restriction-anyType.xsd22
-rw-r--r--libxml2/test/schemas/deter0_0.xml5
-rw-r--r--libxml2/test/schemas/deter0_0.xsd16
-rw-r--r--libxml2/test/schemas/dur_0.xml13
-rw-r--r--libxml2/test/schemas/dur_0.xsd72
-rw-r--r--libxml2/test/schemas/elem0_0.xml3
-rw-r--r--libxml2/test/schemas/elem0_0.xsd16
-rw-r--r--libxml2/test/schemas/element-err_0.xml4
-rw-r--r--libxml2/test/schemas/element-err_0.xsd39
-rw-r--r--libxml2/test/schemas/element-minmax-err_0.xml5
-rw-r--r--libxml2/test/schemas/element-minmax-err_0.xsd11
-rw-r--r--libxml2/test/schemas/empty-value_0.xml2
-rw-r--r--libxml2/test/schemas/empty-value_1.xml2
-rw-r--r--libxml2/test/schemas/empty-value_1.xsd24
-rw-r--r--libxml2/test/schemas/empty_0.xml1
-rw-r--r--libxml2/test/schemas/empty_0.xsd13
-rw-r--r--libxml2/test/schemas/empty_1.xsd9
-rw-r--r--libxml2/test/schemas/extension0_0.xml7
-rw-r--r--libxml2/test/schemas/extension0_0.xsd20
-rw-r--r--libxml2/test/schemas/extension1_0.xml1
-rw-r--r--libxml2/test/schemas/extension1_0.xsd17
-rw-r--r--libxml2/test/schemas/extension1_1.xml1
-rw-r--r--libxml2/test/schemas/extension1_2.xml1
-rw-r--r--libxml2/test/schemas/extension2_0.xml4
-rw-r--r--libxml2/test/schemas/extension2_1.xsd17
-rw-r--r--libxml2/test/schemas/facet-unionST-err1_0.xml4
-rw-r--r--libxml2/test/schemas/facet-unionST-err1_0.xsd27
-rw-r--r--libxml2/test/schemas/facet-whiteSpace_0.xml7
-rw-r--r--libxml2/test/schemas/facet-whiteSpace_0.xsd12
-rw-r--r--libxml2/test/schemas/group0_0.xml3
-rw-r--r--libxml2/test/schemas/group0_0.xsd18
-rw-r--r--libxml2/test/schemas/hexbinary_0.xml20
-rw-r--r--libxml2/test/schemas/hexbinary_0.xsd35
-rw-r--r--libxml2/test/schemas/hexbinary_1.xml15
-rw-r--r--libxml2/test/schemas/idc-keyref-err1_0.xml14
-rw-r--r--libxml2/test/schemas/idc-keyref-err1_1.xsd53
-rw-r--r--libxml2/test/schemas/import-455953.xsd24
-rwxr-xr-xlibxml2/test/schemas/import-bad-1_0.imp5
-rw-r--r--libxml2/test/schemas/import0_0.imp13
-rw-r--r--libxml2/test/schemas/import0_0.xml8
-rw-r--r--libxml2/test/schemas/import0_0.xsd21
-rw-r--r--libxml2/test/schemas/import1_0.imp8
-rw-r--r--libxml2/test/schemas/import1_0.xml11
-rw-r--r--libxml2/test/schemas/import1_0.xsd30
-rw-r--r--libxml2/test/schemas/import1_0b.imp8
-rw-r--r--libxml2/test/schemas/import2_0.imp24
-rw-r--r--libxml2/test/schemas/import2_0.xml8
-rw-r--r--libxml2/test/schemas/import2_0.xsd24
-rw-r--r--libxml2/test/schemas/include1_0.inc28
-rw-r--r--libxml2/test/schemas/include1_0.xml8
-rw-r--r--libxml2/test/schemas/include1_0.xsd15
-rw-r--r--libxml2/test/schemas/include2_0.inc17
-rw-r--r--libxml2/test/schemas/include2_0.xml9
-rw-r--r--libxml2/test/schemas/include2_0.xsd14
-rw-r--r--libxml2/test/schemas/include3_0.inc5
-rw-r--r--libxml2/test/schemas/include3_0.xml7
-rw-r--r--libxml2/test/schemas/include3_0.xsd9
-rw-r--r--libxml2/test/schemas/item_0.xml6
-rw-r--r--libxml2/test/schemas/item_0.xsd39
-rw-r--r--libxml2/test/schemas/item_1.xsd42
-rw-r--r--libxml2/test/schemas/length1_0.xml1
-rw-r--r--libxml2/test/schemas/length1_0.xsd11
-rw-r--r--libxml2/test/schemas/length2_0.xml5
-rw-r--r--libxml2/test/schemas/length2_0.xsd14
-rw-r--r--libxml2/test/schemas/length3_0.xml5
-rw-r--r--libxml2/test/schemas/length3_0.xsd10
-rw-r--r--libxml2/test/schemas/list0_0.xml6
-rw-r--r--libxml2/test/schemas/list0_0.xsd13
-rw-r--r--libxml2/test/schemas/list0_1.xml3
-rw-r--r--libxml2/test/schemas/list0_1.xsd13
-rw-r--r--libxml2/test/schemas/list0_2.xml4
-rw-r--r--libxml2/test/schemas/mixed0_0.xml1
-rw-r--r--libxml2/test/schemas/mixed0_0.xsd5
-rw-r--r--libxml2/test/schemas/mixed1_0.xml1
-rw-r--r--libxml2/test/schemas/mixed1_0.xsd7
-rw-r--r--libxml2/test/schemas/ns0_0.xml2
-rw-r--r--libxml2/test/schemas/ns0_0.xsd16
-rw-r--r--libxml2/test/schemas/ns0_1.xml2
-rw-r--r--libxml2/test/schemas/ns0_1.xsd16
-rw-r--r--libxml2/test/schemas/ns0_2.xml2
-rw-r--r--libxml2/test/schemas/ns0_3.xml2
-rw-r--r--libxml2/test/schemas/ns0_4.xml3
-rw-r--r--libxml2/test/schemas/ns1_0.xml2
-rw-r--r--libxml2/test/schemas/ns1_0.xsd3
-rw-r--r--libxml2/test/schemas/ns2_0.xml1
-rw-r--r--libxml2/test/schemas/ns2_0.xsd15
-rw-r--r--libxml2/test/schemas/nvdcve_0.xml5235
-rw-r--r--libxml2/test/schemas/nvdcve_0.xsd498
-rw-r--r--libxml2/test/schemas/po0_0.xml32
-rw-r--r--libxml2/test/schemas/po0_0.xsd59
-rw-r--r--libxml2/test/schemas/po1_0.xml34
-rw-r--r--libxml2/test/schemas/po1_0.xsd64
-rw-r--r--libxml2/test/schemas/poschargrp0_0.xml2
-rw-r--r--libxml2/test/schemas/poschargrp0_0.xsd14
-rw-r--r--libxml2/test/schemas/regexp-char-ref_0.xml7
-rw-r--r--libxml2/test/schemas/regexp-char-ref_0.xsd20
-rw-r--r--libxml2/test/schemas/regexp-char-ref_1.xsd20
-rw-r--r--libxml2/test/schemas/restrict-CT-attr-ref_0.xml3
-rw-r--r--libxml2/test/schemas/restrict-CT-attr-ref_0.xsd30
-rw-r--r--libxml2/test/schemas/restriction-attr1_0.xml3
-rw-r--r--libxml2/test/schemas/restriction-attr1_0.xsd18
-rw-r--r--libxml2/test/schemas/restriction-enum-1_0.xml7
-rw-r--r--libxml2/test/schemas/restriction-enum-1_1.xsd19
-rw-r--r--libxml2/test/schemas/restriction0_0.xml5
-rw-r--r--libxml2/test/schemas/restriction0_0.xsd21
-rw-r--r--libxml2/test/schemas/scc-no-xmlns_0.xml3
-rw-r--r--libxml2/test/schemas/scc-no-xmlns_0.xsd11
-rw-r--r--libxml2/test/schemas/scc-no-xsi_0.xml3
-rw-r--r--libxml2/test/schemas/scc-no-xsi_0.xsd11
-rw-r--r--libxml2/test/schemas/seq-dubl-elem1_0.xml7
-rw-r--r--libxml2/test/schemas/seq-dubl-elem1_0.xsd25
-rw-r--r--libxml2/test/schemas/seq0_0.xml61
-rw-r--r--libxml2/test/schemas/seq0_0.xsd64
-rw-r--r--libxml2/test/schemas/src-attribute1_0.xml2
-rw-r--r--libxml2/test/schemas/src-attribute1_0.xsd13
-rw-r--r--libxml2/test/schemas/src-attribute2_0.xml2
-rw-r--r--libxml2/test/schemas/src-attribute2_0.xsd13
-rw-r--r--libxml2/test/schemas/src-attribute3-1_0.xml2
-rw-r--r--libxml2/test/schemas/src-attribute3-1_0.xsd15
-rw-r--r--libxml2/test/schemas/src-attribute3-2-form_0.xml2
-rw-r--r--libxml2/test/schemas/src-attribute3-2-form_0.xsd16
-rw-r--r--libxml2/test/schemas/src-attribute3-2-st_0.xml2
-rw-r--r--libxml2/test/schemas/src-attribute3-2-st_0.xsd22
-rw-r--r--libxml2/test/schemas/src-attribute3-2-type_0.xml2
-rw-r--r--libxml2/test/schemas/src-attribute3-2-type_0.xsd16
-rw-r--r--libxml2/test/schemas/src-attribute4_0.xml2
-rw-r--r--libxml2/test/schemas/src-attribute4_0.xsd17
-rw-r--r--libxml2/test/schemas/src-element1_0.xml2
-rw-r--r--libxml2/test/schemas/src-element1_0.xsd9
-rw-r--r--libxml2/test/schemas/src-element2-1_0.xml2
-rw-r--r--libxml2/test/schemas/src-element2-1_0.xsd17
-rw-r--r--libxml2/test/schemas/src-element2-2_0.xml2
-rw-r--r--libxml2/test/schemas/src-element2-2_0.xsd48
-rw-r--r--libxml2/test/schemas/src-element3_0.xml2
-rw-r--r--libxml2/test/schemas/src-element3_0.xsd29
-rw-r--r--libxml2/test/schemas/subst-group-1_0.xsd45
-rw-r--r--libxml2/test/schemas/subst-group-1_1.xml12
-rw-r--r--libxml2/test/schemas/union2_1.xml6
-rw-r--r--libxml2/test/schemas/union2_1.xsd21
-rw-r--r--libxml2/test/schemas/union_0_0.xml8
-rw-r--r--libxml2/test/schemas/union_0_0.xsd53
-rw-r--r--libxml2/test/schemas/vdv-complexTypes.xsd37
-rw-r--r--libxml2/test/schemas/vdv-first0_0.xml33
-rw-r--r--libxml2/test/schemas/vdv-first0_0.xsd67
-rw-r--r--libxml2/test/schemas/vdv-first1_0.xml33
-rw-r--r--libxml2/test/schemas/vdv-first1_0.xsd47
-rw-r--r--libxml2/test/schemas/vdv-first2_0.xml33
-rw-r--r--libxml2/test/schemas/vdv-first2_0.xsd89
-rw-r--r--libxml2/test/schemas/vdv-first3_0.xml33
-rw-r--r--libxml2/test/schemas/vdv-first3_0.xsd68
-rw-r--r--libxml2/test/schemas/vdv-first4_0.xml33
-rwxr-xr-xlibxml2/test/schemas/vdv-first4_0.xsd150
-rw-r--r--libxml2/test/schemas/vdv-first4_1.xml33
-rw-r--r--libxml2/test/schemas/vdv-first4_2.xml33
-rw-r--r--libxml2/test/schemas/vdv-first5_0.xml33
-rw-r--r--libxml2/test/schemas/vdv-first5_0.xsd85
-rw-r--r--libxml2/test/schemas/vdv-simpleTypes.xsd38
-rw-r--r--libxml2/test/schemas/xml.xsd117
-rw-r--r--libxml2/test/schemas/xsd-list-itemType_0.xml3
-rw-r--r--libxml2/test/schemas/xsd-list-itemType_0.xsd14
-rw-r--r--libxml2/test/schemas/xsd-simpleType-varieties_0.xml8
-rw-r--r--libxml2/test/schemas/xsd-simpleType-varieties_0.xsd45
337 files changed, 13343 insertions, 0 deletions
diff --git a/libxml2/test/schemas/570702_0.xml b/libxml2/test/schemas/570702_0.xml
new file mode 100644
index 0000000..774e56f
--- /dev/null
+++ b/libxml2/test/schemas/570702_0.xml
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- edited with XML Spy v4.3 U (http://www.xmlspy.com) by asdf (fdsa) -->
+<!--Sample XML file generated by XML Spy v4.3 U (http://www.xmlspy.com)-->
+<dn_len_list xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+xsi:noNamespaceSchemaLocation="Z:\proto\wsif\temp.xsd">
+ <dn_length>15</dn_length>
+ <destroy>127</destroy>
+ <dn_length>15</dn_length>
+ <destroy>127</destroy>
+ <dn_length>15</dn_length>
+ <destroy>127</destroy>
+</dn_len_list>
+
diff --git a/libxml2/test/schemas/570702_0.xsd b/libxml2/test/schemas/570702_0.xsd
new file mode 100644
index 0000000..397a4d6
--- /dev/null
+++ b/libxml2/test/schemas/570702_0.xsd
@@ -0,0 +1,25 @@
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+elementFormDefault="qualified" attributeFormDefault="unqualified">
+<xs:element name="dn_len_list">
+<xs:complexType>
+ <xs:sequence maxOccurs="3">
+ <xs:element name="dn_length" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation>Destination Number Length</xs:documentation>
+ </xs:annotation>
+ <xs:simpleType>
+ <xs:restriction base="xs:byte">
+ <xs:minInclusive value="1"/>
+ <xs:maxInclusive value="15"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:element>
+ <xs:element name="destroy" type="xs:byte" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation>destroy flag</xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ </xs:sequence>
+</xs:complexType>
+</xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/579746_0.xml b/libxml2/test/schemas/579746_0.xml
new file mode 100644
index 0000000..7e42f2a
--- /dev/null
+++ b/libxml2/test/schemas/579746_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0"?>
+<contact>
+</contact>
diff --git a/libxml2/test/schemas/579746_0.xsd b/libxml2/test/schemas/579746_0.xsd
new file mode 100644
index 0000000..1695fe6
--- /dev/null
+++ b/libxml2/test/schemas/579746_0.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name= "contact" type="ContactType"/>
+ <xsd:complexType name="ContactType">
+ <xsd:choice minOccurs="2" maxOccurs="2">
+ <xsd:element name="customer" type="xsd:string" />
+ <xsd:element name="comment" type="xsd:string" minOccurs="0"/>
+ </xsd:choice>
+ </xsd:complexType>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/579746_1.xml b/libxml2/test/schemas/579746_1.xml
new file mode 100644
index 0000000..12f3d4d
--- /dev/null
+++ b/libxml2/test/schemas/579746_1.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<contact>
+ <customer/>
+</contact>
diff --git a/libxml2/test/schemas/579746_1.xsd b/libxml2/test/schemas/579746_1.xsd
new file mode 100644
index 0000000..e354967
--- /dev/null
+++ b/libxml2/test/schemas/579746_1.xsd
@@ -0,0 +1,10 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name= "contact" type="ContactType"/>
+ <xsd:complexType name="ContactType">
+ <xsd:choice minOccurs="1" maxOccurs="2">
+ <xsd:element name="customer" type="xsd:string" />
+ <xsd:element name="comment" type="xsd:string" minOccurs="0"/>
+ </xsd:choice>
+ </xsd:complexType>
+</xsd:schema>
diff --git a/libxml2/test/schemas/579746_2.xml b/libxml2/test/schemas/579746_2.xml
new file mode 100644
index 0000000..5d16dea
--- /dev/null
+++ b/libxml2/test/schemas/579746_2.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<contact>
+ <customer/>
+ <customer/>
+</contact>
diff --git a/libxml2/test/schemas/579746_3.xml b/libxml2/test/schemas/579746_3.xml
new file mode 100644
index 0000000..aedcc21
--- /dev/null
+++ b/libxml2/test/schemas/579746_3.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<contact>
+ <customer/>
+ <comment/>
+ <customer/>
+ <comment/>
+</contact>
diff --git a/libxml2/test/schemas/579746_4.xml b/libxml2/test/schemas/579746_4.xml
new file mode 100644
index 0000000..94bdc55
--- /dev/null
+++ b/libxml2/test/schemas/579746_4.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<contact>
+ <customer/>
+ <comment/>
+</contact>
diff --git a/libxml2/test/schemas/579746_5.xml b/libxml2/test/schemas/579746_5.xml
new file mode 100644
index 0000000..b4b1350
--- /dev/null
+++ b/libxml2/test/schemas/579746_5.xml
@@ -0,0 +1,6 @@
+<?xml version="1.0"?>
+<contact>
+ <comment/>
+ <customer/>
+ <comment/>
+</contact>
diff --git a/libxml2/test/schemas/582887-attribute.xsd b/libxml2/test/schemas/582887-attribute.xsd
new file mode 100644
index 0000000..75d7d4a
--- /dev/null
+++ b/libxml2/test/schemas/582887-attribute.xsd
@@ -0,0 +1,12 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://www.example.org/test-import-case"
+ targetNamespace="http://www.example.org/test-import-case">
+
+ <xs:simpleType name="test-attribute">
+ <xs:restriction base="xs:string">
+ <xs:enumeration value="this" />
+ </xs:restriction>
+ </xs:simpleType>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582887-common.xsd b/libxml2/test/schemas/582887-common.xsd
new file mode 100644
index 0000000..c1c385d
--- /dev/null
+++ b/libxml2/test/schemas/582887-common.xsd
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://www.example.org/test-import-case"
+ targetNamespace="http://www.example.org/test-import-case">
+ <xs:include schemaLocation="./582887-element.xsd" />
+ <xs:include schemaLocation="./582887-attribute.xsd" />
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582887-element.xsd b/libxml2/test/schemas/582887-element.xsd
new file mode 100644
index 0000000..0562021
--- /dev/null
+++ b/libxml2/test/schemas/582887-element.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://www.example.org/test-import-case"
+ targetNamespace="http://www.example.org/test-import-case">
+ <xs:include schemaLocation="./582887-common.xsd" />
+
+ <xs:complexType name="test-element">
+ <xs:attribute name="test-attribute" type="test-attribute" />
+ </xs:complexType>
+ <xs:element name="test-element" type="test-element" />
+</xs:schema>
diff --git a/libxml2/test/schemas/582887_0.xml b/libxml2/test/schemas/582887_0.xml
new file mode 100644
index 0000000..0a74714
--- /dev/null
+++ b/libxml2/test/schemas/582887_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<test-case xmlns="http://www.example.org/test-case"
+ xmlns:tc="http://www.example.org/test-import-case"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://www.example.org/test-case ./582887-case.xsd">
+ <tc:test-element test-attribute="this" />
+</test-case>
diff --git a/libxml2/test/schemas/582887_0.xsd b/libxml2/test/schemas/582887_0.xsd
new file mode 100644
index 0000000..a3b175a
--- /dev/null
+++ b/libxml2/test/schemas/582887_0.xsd
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:tc="http://www.example.org/test-import-case"
+ xmlns="http://www.example.org/test-case"
+ targetNamespace="http://www.example.org/test-case">
+
+ <xs:import namespace="http://www.example.org/test-import-case"
+ schemaLocation="./582887-common.xsd" />
+
+ <xs:complexType name="test-case">
+ <xs:sequence>
+ <xs:element ref="tc:test-element" />
+ </xs:sequence>
+ </xs:complexType>
+ <xs:element name="test-case" type="test-case" />
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-1-common.xsd b/libxml2/test/schemas/582906-1-common.xsd
new file mode 100644
index 0000000..aa7cbda
--- /dev/null
+++ b/libxml2/test/schemas/582906-1-common.xsd
@@ -0,0 +1,6 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified">
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-1-prog1.xsd b/libxml2/test/schemas/582906-1-prog1.xsd
new file mode 100644
index 0000000..33dde56
--- /dev/null
+++ b/libxml2/test/schemas/582906-1-prog1.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns="http://example.com/xml/Prog1"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ targetNamespace="http://example.com/xml/Prog1">
+
+ <xs:include schemaLocation="582906-1-common.xsd"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-1-prog2-include.xsd b/libxml2/test/schemas/582906-1-prog2-include.xsd
new file mode 100644
index 0000000..8701cfc
--- /dev/null
+++ b/libxml2/test/schemas/582906-1-prog2-include.xsd
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified" attributeFormDefault="unqualified"
+ xml:lang="en">
+
+ <xs:include schemaLocation="582906-1-common.xsd"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-1-prog2.xsd b/libxml2/test/schemas/582906-1-prog2.xsd
new file mode 100644
index 0000000..4528fff
--- /dev/null
+++ b/libxml2/test/schemas/582906-1-prog2.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns="http://example.com/xml/Prog2"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ targetNamespace="http://example.com/xml/Prog2">
+
+ <xs:include schemaLocation="582906-1-common.xsd"/>
+
+ <xs:include schemaLocation="582906-1-prog2-include.xsd"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-1_0.xml b/libxml2/test/schemas/582906-1_0.xml
new file mode 100644
index 0000000..311d85f
--- /dev/null
+++ b/libxml2/test/schemas/582906-1_0.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<CollectedOutput xmlns="http://example.com/xml/Aggregator"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://example.com/xml/Aggregator
+ 582906-1.xsd">5.3</CollectedOutput>
diff --git a/libxml2/test/schemas/582906-1_0.xsd b/libxml2/test/schemas/582906-1_0.xsd
new file mode 100644
index 0000000..578f5a4
--- /dev/null
+++ b/libxml2/test/schemas/582906-1_0.xsd
@@ -0,0 +1,20 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns="http://example.com/xml/Aggregator"
+ xmlns:prog1="http://example.com/xml/Prog1"
+ xmlns:prog2="http://example.com/xml/Prog2"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ targetNamespace="http://example.com/xml/Aggregator">
+
+ <xs:import schemaLocation="582906-1-prog1.xsd"
+ namespace="http://example.com/xml/Prog1" />
+
+ <xs:import schemaLocation="582906-1-prog2.xsd"
+ namespace="http://example.com/xml/Prog2"
+ />
+
+ <xs:element name="CollectedOutput" type="xs:float"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-2-common.xsd b/libxml2/test/schemas/582906-2-common.xsd
new file mode 100644
index 0000000..c3b8c37
--- /dev/null
+++ b/libxml2/test/schemas/582906-2-common.xsd
@@ -0,0 +1,7 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ targetNamespace="http://example.com/xml/Prog3">
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-2-prog1.xsd b/libxml2/test/schemas/582906-2-prog1.xsd
new file mode 100644
index 0000000..5cd2d41
--- /dev/null
+++ b/libxml2/test/schemas/582906-2-prog1.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns="http://example.com/xml/Prog1"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ targetNamespace="http://example.com/xml/Prog1">
+
+ <xs:include schemaLocation="582906-2-common.xsd"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-2-prog2-include.xsd b/libxml2/test/schemas/582906-2-prog2-include.xsd
new file mode 100644
index 0000000..4985aa3
--- /dev/null
+++ b/libxml2/test/schemas/582906-2-prog2-include.xsd
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified" attributeFormDefault="unqualified"
+ xml:lang="en">
+
+ <xs:include schemaLocation="582906-2-common.xsd"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-2-prog2.xsd b/libxml2/test/schemas/582906-2-prog2.xsd
new file mode 100644
index 0000000..9446f21
--- /dev/null
+++ b/libxml2/test/schemas/582906-2-prog2.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns="http://example.com/xml/Prog2"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ targetNamespace="http://example.com/xml/Prog2">
+
+ <xs:include schemaLocation="582906-2-common.xsd"/>
+
+ <xs:include schemaLocation="582906-2-prog2-include.xsd"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/582906-2_0.xml b/libxml2/test/schemas/582906-2_0.xml
new file mode 100644
index 0000000..e928957
--- /dev/null
+++ b/libxml2/test/schemas/582906-2_0.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<CollectedOutput xmlns="http://example.com/xml/Aggregator"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://example.com/xml/Aggregator
+ 582906-2-0.xsd">5.3</CollectedOutput>
diff --git a/libxml2/test/schemas/582906-2_0.xsd b/libxml2/test/schemas/582906-2_0.xsd
new file mode 100644
index 0000000..e62ebb8
--- /dev/null
+++ b/libxml2/test/schemas/582906-2_0.xsd
@@ -0,0 +1,20 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Id$ -->
+<xs:schema xmlns="http://example.com/xml/Aggregator"
+ xmlns:prog1="http://example.com/xml/Prog1"
+ xmlns:prog2="http://example.com/xml/Prog2"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ targetNamespace="http://example.com/xml/Aggregator">
+
+ <xs:import schemaLocation="582906-2-prog1.xsd"
+ namespace="http://example.com/xml/Prog1" />
+
+ <xs:import schemaLocation="582906-2-prog2.xsd"
+ namespace="http://example.com/xml/Prog2"
+ />
+
+ <xs:element name="CollectedOutput" type="xs:float"/>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/all.xsd b/libxml2/test/schemas/all.xsd
new file mode 100644
index 0000000..b2e70e3
--- /dev/null
+++ b/libxml2/test/schemas/all.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:complexType name="PurchaseOrderType">
+ <xsd:sequence>
+ <xsd:all>
+ <xsd:element name="shipTo" type="USAddress"/>
+ <xsd:element name="billTo" type="USAddress"/>
+ <xsd:element name="items" type="Items"/>
+ </xsd:all>
+ <xsd:sequence>
+ <xsd:element ref="comment" minOccurs="0" maxOccurs="unbounded"/>
+ </xsd:sequence>
+ </xsd:sequence>
+ <xsd:attribute name="orderDate" type="xsd:date"/>
+ </xsd:complexType>
+</xsd:schema>
diff --git a/libxml2/test/schemas/all1_0.xml b/libxml2/test/schemas/all1_0.xml
new file mode 100644
index 0000000..f50088c
--- /dev/null
+++ b/libxml2/test/schemas/all1_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<a>
+ <b/>
+</a>
diff --git a/libxml2/test/schemas/all1_0.xsd b/libxml2/test/schemas/all1_0.xsd
new file mode 100644
index 0000000..28fee0e
--- /dev/null
+++ b/libxml2/test/schemas/all1_0.xsd
@@ -0,0 +1,10 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:complexType name="A">
+ <xs:all>
+ <xs:element name="b" type="xs:string" minOccurs="0"/>
+ </xs:all>
+ </xs:complexType>
+
+ <xs:element name="a" type="A"/>
+</xs:schema>
diff --git a/libxml2/test/schemas/all_0.xml b/libxml2/test/schemas/all_0.xml
new file mode 100644
index 0000000..fb5b0fa
--- /dev/null
+++ b/libxml2/test/schemas/all_0.xml
@@ -0,0 +1 @@
+<doc><a/><b/><c/></doc>
diff --git a/libxml2/test/schemas/all_0.xsd b/libxml2/test/schemas/all_0.xsd
new file mode 100644
index 0000000..55c04ee
--- /dev/null
+++ b/libxml2/test/schemas/all_0.xsd
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="doc">
+ <xsd:complexType>
+ <xsd:all minOccurs="1">
+ <xsd:element name="a"/>
+ <xsd:element name="b"/>
+ <xsd:element name="c"/>
+ </xsd:all>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/all_1.xml b/libxml2/test/schemas/all_1.xml
new file mode 100644
index 0000000..41d797e
--- /dev/null
+++ b/libxml2/test/schemas/all_1.xml
@@ -0,0 +1,2 @@
+<doc><b/><c/><a/></doc>
+
diff --git a/libxml2/test/schemas/all_1.xsd b/libxml2/test/schemas/all_1.xsd
new file mode 100644
index 0000000..bc386f3
--- /dev/null
+++ b/libxml2/test/schemas/all_1.xsd
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="doc">
+ <xsd:complexType>
+ <xsd:all minOccurs="0">
+ <xsd:element name="a"/>
+ <xsd:element name="b"/>
+ <xsd:element name="c"/>
+ </xsd:all>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/all_2.xml b/libxml2/test/schemas/all_2.xml
new file mode 100644
index 0000000..cc1580b
--- /dev/null
+++ b/libxml2/test/schemas/all_2.xml
@@ -0,0 +1 @@
+<doc><b/><a/><c/></doc>
diff --git a/libxml2/test/schemas/all_2.xsd b/libxml2/test/schemas/all_2.xsd
new file mode 100644
index 0000000..630b0df
--- /dev/null
+++ b/libxml2/test/schemas/all_2.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="doc">
+ <xsd:complexType>
+ <xsd:all>
+ <xsd:element name="a"/>
+ <xsd:element minOccurs="0" name="b"/>
+ </xsd:all>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/all_3.xml b/libxml2/test/schemas/all_3.xml
new file mode 100644
index 0000000..c011b3f
--- /dev/null
+++ b/libxml2/test/schemas/all_3.xml
@@ -0,0 +1 @@
+<doc><a/><b/></doc>
diff --git a/libxml2/test/schemas/all_4.xml b/libxml2/test/schemas/all_4.xml
new file mode 100644
index 0000000..afa807c
--- /dev/null
+++ b/libxml2/test/schemas/all_4.xml
@@ -0,0 +1 @@
+<doc></doc>
diff --git a/libxml2/test/schemas/all_5.xml b/libxml2/test/schemas/all_5.xml
new file mode 100644
index 0000000..d68f321
--- /dev/null
+++ b/libxml2/test/schemas/all_5.xml
@@ -0,0 +1 @@
+<doc><a/><b/><a/></doc>
diff --git a/libxml2/test/schemas/all_6.xml b/libxml2/test/schemas/all_6.xml
new file mode 100644
index 0000000..7dd71b1
--- /dev/null
+++ b/libxml2/test/schemas/all_6.xml
@@ -0,0 +1 @@
+<doc><a/></doc>
diff --git a/libxml2/test/schemas/all_7.xml b/libxml2/test/schemas/all_7.xml
new file mode 100644
index 0000000..c011b3f
--- /dev/null
+++ b/libxml2/test/schemas/all_7.xml
@@ -0,0 +1 @@
+<doc><a/><b/></doc>
diff --git a/libxml2/test/schemas/allsg_0.xml b/libxml2/test/schemas/allsg_0.xml
new file mode 100644
index 0000000..814646f
--- /dev/null
+++ b/libxml2/test/schemas/allsg_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo sg-all.xsd">
+ <gm-B-2/>
+ <gm-A-1/>
+</foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/allsg_0.xsd b/libxml2/test/schemas/allsg_0.xsd
new file mode 100644
index 0000000..11d27a8
--- /dev/null
+++ b/libxml2/test/schemas/allsg_0.xsd
@@ -0,0 +1,26 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ xmlns:foo="urn:test:foo">
+
+ <!-- Substitution group heads. -->
+ <xsd:element name="gh-A" abstract="true"/>
+ <xsd:element name="gh-B" abstract="true"/>
+
+ <!-- Substitution group members. -->
+ <xsd:element name="gm-A-1" substitutionGroup="foo:gh-A"/>
+ <xsd:element name="gm-A-2" substitutionGroup="foo:gh-A"/>
+
+ <xsd:element name="gm-B-1" substitutionGroup="foo:gh-B"/>
+ <xsd:element name="gm-B-2" substitutionGroup="foo:gh-B"/>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:all>
+ <xsd:element ref="foo:gh-A"/>
+ <xsd:element ref="foo:gh-B"/>
+ </xsd:all>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/allsg_1.xml b/libxml2/test/schemas/allsg_1.xml
new file mode 100644
index 0000000..d1dc9c4
--- /dev/null
+++ b/libxml2/test/schemas/allsg_1.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo sg-all.xsd">
+ <gm-B-2/>
+ <gm-A-2/>
+</foo>
+
diff --git a/libxml2/test/schemas/allsg_2.xml b/libxml2/test/schemas/allsg_2.xml
new file mode 100644
index 0000000..b39cb7a
--- /dev/null
+++ b/libxml2/test/schemas/allsg_2.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo sg-all.xsd">
+ <gm-A-2/>
+ <gm-B-2/>
+</foo>
+
diff --git a/libxml2/test/schemas/allsg_3.xml b/libxml2/test/schemas/allsg_3.xml
new file mode 100644
index 0000000..ac37b7b
--- /dev/null
+++ b/libxml2/test/schemas/allsg_3.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo sg-all.xsd">
+ <gm-B-2/>
+ <gm-B-1/>
+</foo>
diff --git a/libxml2/test/schemas/allsg_4.xml b/libxml2/test/schemas/allsg_4.xml
new file mode 100644
index 0000000..bbb654a
--- /dev/null
+++ b/libxml2/test/schemas/allsg_4.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo sg-all.xsd">
+ <gm-A-1/>
+ <gm-A-1/>
+</foo>
diff --git a/libxml2/test/schemas/allsg_5.xml b/libxml2/test/schemas/allsg_5.xml
new file mode 100644
index 0000000..44dde3e
--- /dev/null
+++ b/libxml2/test/schemas/allsg_5.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo sg-all.xsd">
+ <gm-B-1/>
+ <gm-A-2/>
+ <gm-B-2/>
+</foo>
diff --git a/libxml2/test/schemas/annot-err_0.xml b/libxml2/test/schemas/annot-err_0.xml
new file mode 100644
index 0000000..fe92b0a
--- /dev/null
+++ b/libxml2/test/schemas/annot-err_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO annot-err_0.xsd"/> \ No newline at end of file
diff --git a/libxml2/test/schemas/annot-err_0.xsd b/libxml2/test/schemas/annot-err_0.xsd
new file mode 100644
index 0000000..94d818c
--- /dev/null
+++ b/libxml2/test/schemas/annot-err_0.xsd
@@ -0,0 +1,21 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:goo="http://GOO"
+ xmlns:but="http://BUT">
+ <xsd:element name="foo" xml:lang="hhh">
+ <xsd:annotation id="id1" death="is a good entertainer" but:such="is life">
+ I shouldn't do this here...
+ <xsd:appinfo id="id2" source="somewhere"
+ goo:fun="bag" fun="another fun-bag">
+ weeelll
+ </xsd:appinfo>
+ <xsd:documentation xml:lang="*" id="id3" source="anywhere"
+ goo:mothers="of invention" mothers="don't do your dishes">
+ hmmmmmm
+ </xsd:documentation>
+ ...and here as well - more than ever
+ </xsd:annotation>
+ </xsd:element>
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/any1_0.xml b/libxml2/test/schemas/any1_0.xml
new file mode 100644
index 0000000..91264e4
--- /dev/null
+++ b/libxml2/test/schemas/any1_0.xml
@@ -0,0 +1,21 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!-- Tests xsd:any with "##any". -->
+<foo:foo
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO any1_0.xsd">
+
+ <foo:anything>
+ <foo:boo booAttr="123"/>
+ </foo:anything>
+ <bar:anything>
+ <foo:boo booAttr="213"/>
+ </bar:anything>
+ <anything>
+ <foo:boo booAttr="213"/>
+ </anything>
+
+
+</foo:foo>
+
diff --git a/libxml2/test/schemas/any1_0.xsd b/libxml2/test/schemas/any1_0.xsd
new file mode 100644
index 0000000..ed0087b
--- /dev/null
+++ b/libxml2/test/schemas/any1_0.xsd
@@ -0,0 +1,22 @@
+<?xml version="1.0"?>
+<!-- Tests xsd:any with "##any". -->
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+
+ <xsd:element name="boo">
+ <xsd:complexType>
+ <xsd:attribute name="booAttr" type="xsd:integer" />
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:any namespace="##any" processContents="lax" minOccurs="0" maxOccurs="3"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/any2_0.xml b/libxml2/test/schemas/any2_0.xml
new file mode 100644
index 0000000..e649a2c
--- /dev/null
+++ b/libxml2/test/schemas/any2_0.xml
@@ -0,0 +1,24 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!-- Tests xsd:any with a set of namespaces, icluding
+ "##local" and "##targetNamespace". -->
+<foo:foo
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO any2_0.xsd">
+
+ <foo:anything>
+ <foo:boo booAttr="123"/>
+ </foo:anything>
+
+ <bar:anything>
+ <foo:boo booAttr="123"/>
+ </bar:anything>
+
+ <anything>
+ <foo:boo booAttr="123"/>
+ </anything>
+
+
+</foo:foo>
+
diff --git a/libxml2/test/schemas/any2_0.xsd b/libxml2/test/schemas/any2_0.xsd
new file mode 100644
index 0000000..2bf726e
--- /dev/null
+++ b/libxml2/test/schemas/any2_0.xsd
@@ -0,0 +1,26 @@
+<?xml version="1.0"?>
+<!-- Tests xsd:any with a set of namespaces, icluding
+ "##local" and "##targetNamespace". -->
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+
+ <xsd:element name="boo">
+ <xsd:complexType>
+ <xsd:attribute name="booAttr" type="xsd:integer" />
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:any
+ namespace="##targetNamespace http://BAR ##local"
+ processContents="lax"
+ maxOccurs="3"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/any3_0.xml b/libxml2/test/schemas/any3_0.xml
new file mode 100644
index 0000000..158f91c
--- /dev/null
+++ b/libxml2/test/schemas/any3_0.xml
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!-- Tests xsd:any.
+ invalid: <bar.A/> and <foo:bar.B/>
+ valid: <bar:bar.C/>
+-->
+<foo:foo
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO any3_0.xsd">
+
+ <bar.A/>
+ <foo:bar.B/>
+ <bar:bar.C/>
+
+</foo:foo>
+
diff --git a/libxml2/test/schemas/any3_0.xsd b/libxml2/test/schemas/any3_0.xsd
new file mode 100644
index 0000000..b5c29f6
--- /dev/null
+++ b/libxml2/test/schemas/any3_0.xsd
@@ -0,0 +1,17 @@
+<?xml version="1.0"?>
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:any namespace="##other" processContents="lax"/>
+ <xsd:any namespace="##other" processContents="lax"/>
+ <xsd:any namespace="##other" processContents="lax"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/any4_0.xml b/libxml2/test/schemas/any4_0.xml
new file mode 100644
index 0000000..1620397
--- /dev/null
+++ b/libxml2/test/schemas/any4_0.xml
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!-- Tests xsd:any.
+ invalid: <bar.A/> and <foo:bar.B/>
+ valid: <bar:bar.C/>
+-->
+<foo:foo
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO any4_0.xsd">
+
+ <foo:anything>
+ <foo:boo booAttr="123"/>
+ </foo:anything>
+
+</foo:foo>
+
diff --git a/libxml2/test/schemas/any4_0.xsd b/libxml2/test/schemas/any4_0.xsd
new file mode 100644
index 0000000..fa93577
--- /dev/null
+++ b/libxml2/test/schemas/any4_0.xsd
@@ -0,0 +1,28 @@
+<?xml version="1.0"?>
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+
+ <xsd:element name="boo">
+ <xsd:complexType>
+ <xsd:attribute name="booAttr" type="xsd:integer" />
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:choice>
+ <xsd:any namespace="http://FOO" processContents="lax" maxOccurs="1"/>
+ <xsd:element name="anything" form="qualified">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="foo:boo"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+ </xsd:choice>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/any5_0.xml b/libxml2/test/schemas/any5_0.xml
new file mode 100644
index 0000000..e716cb1
--- /dev/null
+++ b/libxml2/test/schemas/any5_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any5_0.xsd">
+ <boo/>
+ <boo/>
+</foo>
diff --git a/libxml2/test/schemas/any5_0.xsd b/libxml2/test/schemas/any5_0.xsd
new file mode 100644
index 0000000..70c8789
--- /dev/null
+++ b/libxml2/test/schemas/any5_0.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ elementFormDefault="qualified">
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="boo"/>
+ <xsd:any namespace="##other" maxOccurs="5" processContents="lax"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/any5_1.xml b/libxml2/test/schemas/any5_1.xml
new file mode 100644
index 0000000..91dcb54
--- /dev/null
+++ b/libxml2/test/schemas/any5_1.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any5_0.xsd">
+ <boo/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+</foo>
diff --git a/libxml2/test/schemas/any5_1.xsd b/libxml2/test/schemas/any5_1.xsd
new file mode 100644
index 0000000..4d3c9de
--- /dev/null
+++ b/libxml2/test/schemas/any5_1.xsd
@@ -0,0 +1,14 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ elementFormDefault="qualified">
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="boo"/>
+ <xsd:any namespace="##other" maxOccurs="5" processContents="lax"/>
+ <xsd:element name="boo"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/any5_2.xml b/libxml2/test/schemas/any5_2.xml
new file mode 100644
index 0000000..e8434d1
--- /dev/null
+++ b/libxml2/test/schemas/any5_2.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any5_0.xsd">
+ <boo/>
+ <boo xmlns="urn:test:bar"/>
+ <boo/>
+</foo>
diff --git a/libxml2/test/schemas/any5_3.xml b/libxml2/test/schemas/any5_3.xml
new file mode 100644
index 0000000..828c4b3
--- /dev/null
+++ b/libxml2/test/schemas/any5_3.xml
@@ -0,0 +1,11 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any5_0.xsd">
+ <boo/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+</foo>
diff --git a/libxml2/test/schemas/any5_4.xml b/libxml2/test/schemas/any5_4.xml
new file mode 100644
index 0000000..91dcb54
--- /dev/null
+++ b/libxml2/test/schemas/any5_4.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any5_0.xsd">
+ <boo/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+</foo>
diff --git a/libxml2/test/schemas/any5_5.xml b/libxml2/test/schemas/any5_5.xml
new file mode 100644
index 0000000..e09d8a1
--- /dev/null
+++ b/libxml2/test/schemas/any5_5.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any5_0.xsd">
+ <boo/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo/>
+</foo>
diff --git a/libxml2/test/schemas/any5_6.xml b/libxml2/test/schemas/any5_6.xml
new file mode 100644
index 0000000..3b0ad73
--- /dev/null
+++ b/libxml2/test/schemas/any5_6.xml
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any5_0.xsd">
+ <boo/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo xmlns="urn:test:bar"/>
+ <boo/>
+</foo>
diff --git a/libxml2/test/schemas/any6_0.xml b/libxml2/test/schemas/any6_0.xml
new file mode 100755
index 0000000..068a1a9
--- /dev/null
+++ b/libxml2/test/schemas/any6_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<!-- Dummy instance for any-1_1.xsd -->
+<foo:foo xmlns:foo="urn:test:foo" xmlns:moo="urn:test:moo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any-1_1.xsd">
+ <foo:bar/>
+ <moo:moo/>
+</foo:foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/any6_1.xsd b/libxml2/test/schemas/any6_1.xsd
new file mode 100644
index 0000000..23b2f5d
--- /dev/null
+++ b/libxml2/test/schemas/any6_1.xsd
@@ -0,0 +1,36 @@
+<?xml version="1.0"?>
+<!--
+Content model error:
+
+any-err-not-determinist-1.xsd:29: element complexType: Schemas parser error :
+local complex type: The content model is not determinist.
+
+As per Xerces and XSV this schema is OK.
+
+The problem appears when the maxOccurs of <bar> is greater than
+the one of the <any> wildcard. Additionally if both are "unbounded".
+If the latter is a different issue we should add an explicit test
+for it.
+
+Examples:
+<bar> <any> result
+ 2 1 error
+ 2 2 OK
+ 1 2 OK
+ unbounded 2 error
+ unbounded unbounded error
+ 2 unbounded OK
+-->
+
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ elementFormDefault="qualified">
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="bar" maxOccurs="2"/>
+ <xs:any namespace="##other" maxOccurs="1" processContents="lax"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/any6_2.xsd b/libxml2/test/schemas/any6_2.xsd
new file mode 100644
index 0000000..a552ca8
--- /dev/null
+++ b/libxml2/test/schemas/any6_2.xsd
@@ -0,0 +1,19 @@
+<?xml version="1.0"?>
+<!--
+ "element complexType: Schemas parser error :
+ local complex type: The content model is not determinist."
+
+ This schema is OK with XSV and Xerces.
+-->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ elementFormDefault="qualified">
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="bar" maxOccurs="unbounded"/>
+ <xs:any namespace="##other" processContents="lax"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/any7_0.xml b/libxml2/test/schemas/any7_0.xml
new file mode 100755
index 0000000..288b1e7
--- /dev/null
+++ b/libxml2/test/schemas/any7_0.xml
@@ -0,0 +1,19 @@
+<?xml version="1.0"?>
+<!--
+No error reported.
+
+Seems like <moo> is accepted, but should not, since "##other" rules out
+elements in no namespace.
+
+Xerces reports:
+any-err-2.xml:18,8: (Error) cvc-complex-type.2.4.a: Invalid content starting
+with element 'moo'.
+One of '{"urn:test:foo":bar, WC[##other:"urn:test:foo"]}' is expected.
+
+-->
+<foo:foo xmlns:foo="urn:test:foo" xmlns:moo="urn:test:moo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any-2_1.xsd">
+ <foo:bar/>
+ <moo/>
+</foo:foo>
diff --git a/libxml2/test/schemas/any7_1.xml b/libxml2/test/schemas/any7_1.xml
new file mode 100755
index 0000000..624c712
--- /dev/null
+++ b/libxml2/test/schemas/any7_1.xml
@@ -0,0 +1,18 @@
+<?xml version="1.0"?>
+<!--
+Error reported:
+
+any-2_1.xml:17: element bar: Schemas validity error :
+Element '{urn:test:foo}bar': This element is not expected.
+Expected is one of ( {##other:urn:test:foo}* ).
+
+Tiny glitch: the error report mechanism fails to recognize
+that there is only one element of choice. It should report:
+"Excepted is ( {##other:urn:test:foo}* ).".
+-->
+<foo:foo xmlns:foo="urn:test:foo" xmlns:moo="urn:test:moo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any-2_1.xsd">
+ <foo:bar/>
+ <foo:bar/>
+</foo:foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/any7_1.xsd b/libxml2/test/schemas/any7_1.xsd
new file mode 100755
index 0000000..546904f
--- /dev/null
+++ b/libxml2/test/schemas/any7_1.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ elementFormDefault="qualified">
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="bar"/>
+ <xs:any namespace="##other" processContents="lax"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/any7_2.xml b/libxml2/test/schemas/any7_2.xml
new file mode 100644
index 0000000..66d84d0
--- /dev/null
+++ b/libxml2/test/schemas/any7_2.xml
@@ -0,0 +1,20 @@
+<?xml version="1.0"?>
+<!--
+No error reported.
+
+Seems like <moo> is accepted, but should not, since "##other" rules out
+elements in no namespace.
+
+Xerces reports:
+any-err-2.xml:18,8: (Error) cvc-complex-type.2.4.a: Invalid content starting
+with element 'moo'.
+One of '{"urn:test:foo":bar, WC[##other:"urn:test:foo"]}' is expected.
+
+-->
+<foo:foo xmlns:foo="urn:test:foo" xmlns:moo="urn:test:moo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any7_2.xsd">
+ <foo:bar/>
+ <moo:moo/>
+</foo:foo>
+
diff --git a/libxml2/test/schemas/any7_2.xsd b/libxml2/test/schemas/any7_2.xsd
new file mode 100755
index 0000000..cabfd98
--- /dev/null
+++ b/libxml2/test/schemas/any7_2.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ elementFormDefault="qualified">
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="bar"/>
+ <xs:any namespace="##other" processContents="lax" maxOccurs="2"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/any8_0.xml b/libxml2/test/schemas/any8_0.xml
new file mode 100644
index 0000000..6e87cff
--- /dev/null
+++ b/libxml2/test/schemas/any8_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0"?>
+<foo:foo xmlns:foo="urn:test:foo"
+ xmlns:moo="urn:test:moo"
+ xmlns:boo="urn:test:boo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo any8_1.xsd">
+ <foo:bar/>
+ <foo:bar/>
+</foo:foo>
diff --git a/libxml2/test/schemas/any8_1.xsd b/libxml2/test/schemas/any8_1.xsd
new file mode 100644
index 0000000..9264893
--- /dev/null
+++ b/libxml2/test/schemas/any8_1.xsd
@@ -0,0 +1,20 @@
+<?xml version="1.0"?>
+<!--
+ "element complexType: Schemas parser error :
+ local complex type: The content model is not determinist."
+
+ This schema is OK with XSV and Xerces.
+-->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="urn:test:foo"
+ elementFormDefault="qualified">
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="bar"/>
+ <xs:any namespace="##other" processContents="lax" minOccurs="0"/>
+ <xs:element name="bar"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/anyAttr-derive-errors1_0.xml b/libxml2/test/schemas/anyAttr-derive-errors1_0.xml
new file mode 100644
index 0000000..98e948c
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-derive-errors1_0.xml
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:doo="http://DOO"
+ xmlns:import="http://IMPORT"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO anyAttr-derive-errors1_0.xsd">
+
+ <derive.1_1 barA="o" bar:barB="o" foo:barC="o"/>
+ <derive.1_4 barA="o" bar:barB="o" foo:barC="o"/>
+ <derive.2_1 barA="o" bar:barB="o" foo:barC="o" doo:barD="o" />
+ <derive.3_1 barA="o" foo:barC="o" doo:barD="o" />
+ <derive.4_1 bar:barB="o" foo:barC="o" doo:barD="o"/>
+
+ <derive.5_1_a barA="o" bar:barB="o" foo:barC="o" doo:barD="o" />
+ <derive.5_1_b barA="o" bar:barB="o" foo:barC="o" doo:barD="o" />
+
+ <derive.5_2_a bar:barB="o" foo:barC="o" doo:barD="o" />
+ <derive.5_2_b bar:barB="o" foo:barC="o" doo:barD="o" />
+
+ <derive.5_4_a bar:barB="o" doo:barD="o" />
+ <derive.5_4_b bar:barB="o" doo:barD="o" />
+
+ <derive.6_1 barA="o" bar:barB="o" foo:barC="o" doo:barD="o"/>
+ <derive.6_2 bar:barB="o" foo:barC="o" doo:barD="o"/>
+</foo>
+
+
diff --git a/libxml2/test/schemas/anyAttr-derive-errors1_0.xsd b/libxml2/test/schemas/anyAttr-derive-errors1_0.xsd
new file mode 100644
index 0000000..1ab9bab
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-derive-errors1_0.xsd
@@ -0,0 +1,223 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xsd:schema xmlns:foo="http://FOO" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:import="http://IMPORT"
+ targetNamespace="http://FOO" elementFormDefault="qualified">
+ <xsd:import namespace="http://IMPORT" schemaLocation="anyAttr.importA.1_0.xsd"/>
+ <xsd:import schemaLocation="anyAttr.importB.1_0.xsd"/>
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <!-- Attribute Wildcard Union -->
+ <xsd:element name="derive.1_1" type="foo:type.1_1"/>
+ <xsd:element name="derive.1_4" type="foo:type.1_4"/>
+ <xsd:element name="derive.2_1" type="foo:type.2_1"/>
+ <xsd:element name="derive.3_1" type="foo:type.3_1"/>
+ <xsd:element name="derive.4_1" type="foo:type.4_1"/>
+ <xsd:element name="derive.5_1_a" type="foo:type.5_1_a"/>
+ <xsd:element name="derive.5_1_b" type="foo:type.5_1_b"/>
+ <xsd:element name="derive.5_2_a" type="foo:type.5_2_a"/>
+ <xsd:element name="derive.5_2_b" type="foo:type.5_2_b"/>
+ <xsd:element name="derive.5_4_a" type="foo:type.5_4_a"/>
+ <xsd:element name="derive.5_4_b" type="foo:type.5_4_b"/>
+ <xsd:element name="derive.6_1" type="foo:type.6_1"/>
+ <xsd:element name="derive.6_2" type="foo:type.6_2"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <!-- Attribute Wildcard Union -->
+
+ <!-- 1. If O1 and O2 are the same value, then that value must be the value. -->
+ <xsd:complexType name="type.1_1">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.1_1">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.1_1">
+ <xsd:attributeGroup ref="foo:attrGr.1_1"/>
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.1_1">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:attributeGroup>
+
+ <xsd:complexType name="type.1_4">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.1_4">
+ <xsd:anyAttribute namespace="http://BAR ##local http://FOO" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.1_4">
+ <xsd:attributeGroup ref="foo:attrGr.1_4"/>
+ <xsd:anyAttribute namespace="##local http://BAR ##targetNamespace " processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.1_4">
+ <xsd:anyAttribute namespace=" http://FOO http://BAR ##local"/>
+ </xsd:attributeGroup>
+
+ <!-- 2. If either O1 or O2 is any, then any must be the value. -->
+ <xsd:complexType name="type.2_1">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.2_1">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.2_1">
+ <xsd:attributeGroup ref="foo:attrGr.2_1"/>
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.2_1">
+ <xsd:anyAttribute namespace="##local ##targetNamespace"/>
+ </xsd:attributeGroup>
+
+ <!-- 3. If both O1 and O2 are sets of (namespace names or ·absent·),
+ then the union of those sets must be the value. -->
+ <xsd:complexType name="type.3_1">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.3_1">
+ <xsd:anyAttribute namespace="##targetNamespace http://DOO" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.3_1">
+ <xsd:attributeGroup ref="foo:attrGr.3_1"/>
+ <xsd:anyAttribute namespace="##local" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.3_1">
+ <xsd:anyAttribute namespace="##local ##targetNamespace http://BAR"/>
+ </xsd:attributeGroup>
+ <!-- 4 If the two are negations of different values (namespace
+ names or ·absent·), then a pair of not and ·absent· must be the value. -->
+ <xsd:complexType name="type.4_1">
+ <xsd:complexContent>
+ <xsd:extension base="imp.type.base.derive.4_1">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <!-- 5 If either O1 or O2 is a pair of not and a namespace name and
+ the other is a set of (namespace names or ·absent·) (call this set S),
+ then The appropriate case among the following must be true: -->
+ <!-- 5.1 If the set S includes both the negated namespace name and
+ ·absent·, then any must be the value. -->
+ <xsd:complexType name="type.5_1_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_1_a">
+ <xsd:anyAttribute namespace="##local ##targetNamespace" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_1_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_1_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_1_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_1_b">
+ <xsd:anyAttribute namespace="##local ##targetNamespace" processContents="lax"/>
+ </xsd:complexType>
+
+ <!-- 5.2 If the set S includes the negated namespace name but not ·absent·,
+ then a pair of not and ·absent· must be the value. -->
+ <xsd:complexType name="type.5_2_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_2_a">
+ <xsd:anyAttribute namespace="##targetNamespace http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_2_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_2_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_2_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_2_b">
+ <xsd:anyAttribute namespace="##targetNamespace http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ <!-- 5.3 If the set S includes ·absent· but not the negated namespace name,
+ then the union is not expressible. -->
+ <!--
+ <xsd:complexType name="type.5_3_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_3_a">
+ <xsd:anyAttribute namespace="##local http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_3_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_3_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_3_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_3_b">
+ <xsd:anyAttribute namespace="##local http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ -->
+ <!-- 5.4 If the set S does not include either the negated namespace name
+ or ·absent·, then whichever of O1 or O2 is a pair of not and a namespace
+ name must be the value. -->
+ <xsd:complexType name="type.5_4_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_4_a">
+ <xsd:anyAttribute namespace="http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_4_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_4_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_4_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_4_b">
+ <xsd:anyAttribute namespace="http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ <!-- 6 If either O1 or O2 is a pair of not and ·absent· and the other is a
+ set of (namespace names or ·absent·) (again, call this set S), then The
+ appropriate case among the following must be true: -->
+ <!-- 6.1 If the set S includes ·absent·, then any must be the value. -->
+ <xsd:complexType name="type.6_1">
+ <xsd:complexContent>
+ <xsd:extension base="imp.type.base.derive.6">
+ <xsd:anyAttribute namespace="##local http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <!-- 6.2 If the set S does not include ·absent·, then a pair of not and ·absent·
+ must be the value. -->
+ <xsd:complexType name="type.6_2">
+ <xsd:complexContent>
+ <xsd:extension base="imp.type.base.derive.6">
+ <xsd:anyAttribute namespace="http://BAR http://DOO" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+
+</xsd:schema>
+
+
diff --git a/libxml2/test/schemas/anyAttr-derive1_0.xml b/libxml2/test/schemas/anyAttr-derive1_0.xml
new file mode 100644
index 0000000..de89f45
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-derive1_0.xml
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:doo="http://DOO"
+ xmlns:import="http://IMPORT"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO anyAttr-derive1_0.xsd">
+
+ <derive.1_1 barA="o" bar:barB="o" foo:barC="o"/>
+ <derive.1_4 barA="o" bar:barB="o" foo:barC="o"/>
+ <derive.2_1 barA="o" bar:barB="o" foo:barC="o" doo:barD="o" />
+ <derive.3_1 barA="o" foo:barC="o" doo:barD="o" />
+ <derive.4_1 bar:barB="o" foo:barC="o" doo:barD="o"/>
+
+ <derive.5_1_a barA="o" bar:barB="o" foo:barC="o" doo:barD="o" />
+ <derive.5_1_b barA="o" bar:barB="o" foo:barC="o" doo:barD="o" />
+
+ <derive.5_2_a bar:barB="o" foo:barC="o" doo:barD="o" />
+ <derive.5_2_b bar:barB="o" foo:barC="o" doo:barD="o" />
+
+ <derive.5_4_a bar:barB="o" doo:barD="o" />
+ <derive.5_4_b bar:barB="o" doo:barD="o" />
+
+ <derive.6_1 barA="o" bar:barB="o" foo:barC="o" doo:barD="o"/>
+ <derive.6_2 bar:barB="o" foo:barC="o" doo:barD="o"/>
+</foo>
+
+
diff --git a/libxml2/test/schemas/anyAttr-derive1_0.xsd b/libxml2/test/schemas/anyAttr-derive1_0.xsd
new file mode 100644
index 0000000..bc14d99
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-derive1_0.xsd
@@ -0,0 +1,227 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xsd:schema xmlns:foo="http://FOO" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:import="http://IMPORT"
+ targetNamespace="http://FOO" elementFormDefault="qualified">
+ <xsd:import namespace="http://IMPORT" schemaLocation="anyAttr.importA.1_0.xsd"/>
+ <xsd:import schemaLocation="anyAttr.importB.1_0.xsd"/>
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <!-- Attribute Wildcard Union -->
+ <xsd:element name="derive.1_1" type="foo:type.1_1"/>
+ <xsd:element name="derive.1_4" type="foo:type.1_4"/>
+
+ <xsd:element name="derive.2_1" type="foo:type.2_1"/>
+
+ <xsd:element name="derive.3_1" type="foo:type.3_1"/>
+
+ <xsd:element name="derive.4_1" type="foo:type.4_1"/>
+
+ <xsd:element name="derive.5_1_a" type="foo:type.5_1_a"/>
+ <xsd:element name="derive.5_1_b" type="foo:type.5_1_b"/>
+ <xsd:element name="derive.5_2_a" type="foo:type.5_2_a"/>
+ <xsd:element name="derive.5_2_b" type="foo:type.5_2_b"/>
+ <xsd:element name="derive.5_4_a" type="foo:type.5_4_a"/>
+ <xsd:element name="derive.5_4_b" type="foo:type.5_4_b"/>
+ <xsd:element name="derive.6_1" type="foo:type.6_1"/>
+ <xsd:element name="derive.6_2" type="foo:type.6_2"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <!-- Attribute Wildcard Union -->
+
+ <!-- 1. If O1 and O2 are the same value, then that value must be the value. -->
+ <xsd:complexType name="type.1_1">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.1_1">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.1_1">
+ <xsd:attributeGroup ref="foo:attrGr.1_1"/>
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.1_1">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:attributeGroup>
+
+ <xsd:complexType name="type.1_4">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.1_4">
+ <xsd:anyAttribute namespace="http://BAR ##local http://FOO" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.1_4">
+ <xsd:attributeGroup ref="foo:attrGr.1_4"/>
+ <xsd:anyAttribute namespace="##local http://BAR ##targetNamespace " processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.1_4">
+ <xsd:anyAttribute namespace=" http://FOO http://BAR ##local"/>
+ </xsd:attributeGroup>
+
+ <!-- 2. If either O1 or O2 is any, then any must be the value. -->
+ <xsd:complexType name="type.2_1">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.2_1">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.2_1">
+ <xsd:attributeGroup ref="foo:attrGr.2_1"/>
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.2_1">
+ <xsd:anyAttribute namespace="##local ##targetNamespace"/>
+ </xsd:attributeGroup>
+
+ <!-- 3. If both O1 and O2 are sets of (namespace names or ·absent·),
+ then the union of those sets must be the value. -->
+ <xsd:complexType name="type.3_1">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.3_1">
+ <xsd:anyAttribute namespace="##targetNamespace http://DOO" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.3_1">
+ <xsd:attributeGroup ref="foo:attrGr.3_1"/>
+ <xsd:anyAttribute namespace="##local" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.3_1">
+ <xsd:anyAttribute namespace="##local ##targetNamespace http://BAR"/>
+ </xsd:attributeGroup>
+ <!-- 4 If the two are negations of different values (namespace
+ names or ·absent·), then a pair of not and ·absent· must be the value. -->
+ <xsd:complexType name="type.4_1">
+ <xsd:complexContent>
+ <xsd:extension base="imp.type.base.derive.4_1">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <!-- 5 If either O1 or O2 is a pair of not and a namespace name and
+ the other is a set of (namespace names or ·absent·) (call this set S),
+ then The appropriate case among the following must be true: -->
+ <!-- 5.1 If the set S includes both the negated namespace name and
+ ·absent·, then any must be the value. -->
+ <xsd:complexType name="type.5_1_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_1_a">
+ <xsd:anyAttribute namespace="##local ##targetNamespace" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_1_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_1_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_1_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_1_b">
+ <xsd:anyAttribute namespace="##local ##targetNamespace" processContents="lax"/>
+ </xsd:complexType>
+
+ <!-- 5.2 If the set S includes the negated namespace name but not ·absent·,
+ then a pair of not and ·absent· must be the value. -->
+ <xsd:complexType name="type.5_2_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_2_a">
+ <xsd:anyAttribute namespace="##targetNamespace http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_2_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_2_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_2_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_2_b">
+ <xsd:anyAttribute namespace="##targetNamespace http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ <!-- 5.3 If the set S includes ·absent· but not the negated namespace name,
+ then the union is not expressible. -->
+ <!--
+ <xsd:complexType name="type.5_3_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_3_a">
+ <xsd:anyAttribute namespace="##local http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_3_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_3_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_3_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_3_b">
+ <xsd:anyAttribute namespace="##local http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ -->
+ <!-- 5.4 If the set S does not include either the negated namespace name
+ or ·absent·, then whichever of O1 or O2 is a pair of not and a namespace
+ name must be the value. -->
+ <xsd:complexType name="type.5_4_a">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_4_a">
+ <xsd:anyAttribute namespace="http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_4_a">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="type.5_4_b">
+ <xsd:complexContent>
+ <xsd:extension base="foo:type.base.5_4_b">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <xsd:complexType name="type.base.5_4_b">
+ <xsd:anyAttribute namespace="http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ <!-- 6 If either O1 or O2 is a pair of not and ·absent· and the other is a
+ set of (namespace names or ·absent·) (again, call this set S), then The
+ appropriate case among the following must be true: -->
+ <!-- 6.1 If the set S includes ·absent·, then any must be the value. -->
+ <xsd:complexType name="type.6_1">
+ <xsd:complexContent>
+ <xsd:extension base="imp.type.base.derive.6">
+ <xsd:anyAttribute namespace="##local http://BAR" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+ <!-- 6.2 If the set S does not include ·absent·, then a pair of not and ·absent·
+ must be the value. -->
+ <xsd:complexType name="type.6_2">
+ <xsd:complexContent>
+ <xsd:extension base="imp.type.base.derive.6">
+ <xsd:anyAttribute namespace="http://BAR http://DOO" processContents="lax"/>
+ </xsd:extension>
+ </xsd:complexContent>
+ </xsd:complexType>
+
+</xsd:schema>
+
+
diff --git a/libxml2/test/schemas/anyAttr-derive2_0.xml b/libxml2/test/schemas/anyAttr-derive2_0.xml
new file mode 100644
index 0000000..c90cb88
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-derive2_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!--
+-->
+<foo xmlns="http://FOO" xmlns:foo="http://FOO" xmlns:bar="http://BAR" xmlns:boo="http://BOO" xmlns:doo="http://DOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO attrGroup-wildcard1_0.xsd"
+ foo:bar="o" doo:bar="o"/>
+
+
diff --git a/libxml2/test/schemas/anyAttr-derive2_0.xsd b/libxml2/test/schemas/anyAttr-derive2_0.xsd
new file mode 100644
index 0000000..3a74d68
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-derive2_0.xsd
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!--
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO" elementFormDefault="qualified" attributeFormDefault="qualified">
+
+ <element name="foo">
+ <complexType>
+ <complexContent>
+ <extension base="foo:type.A">
+ <anyAttribute namespace="http://DOO" processContents="skip"/>
+ </extension>
+ </complexContent>
+ </complexType>
+ </element>
+
+ <complexType name="type.A">
+ <attributeGroup ref="foo:attrGr.A_1"/>
+ <attributeGroup ref="foo:attrGr.A_2"/>
+ <anyAttribute namespace="http://FOO" processContents="skip"/>
+ </complexType>
+
+ <attributeGroup name="attrGr.A_1">
+ <anyAttribute namespace="http://FOO http://BOO" processContents="skip"/>
+ </attributeGroup>
+
+ <attributeGroup name="attrGr.A_2">
+ <anyAttribute namespace="http://BAR http://DOO http://FOO" processContents="skip"/>
+ </attributeGroup>
+
+
+</schema>
diff --git a/libxml2/test/schemas/anyAttr-errors1_0.xml b/libxml2/test/schemas/anyAttr-errors1_0.xml
new file mode 100644
index 0000000..769a5bb
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-errors1_0.xml
@@ -0,0 +1,26 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:import="http://IMPORT"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO file:///c:/dev/libxml2/patches/2004-05-17/anyAttr-errors1_0.xsd">
+
+ <!-- not allowed: foo:barC -->
+ <basic.B foo:barC="o"/>
+ <!-- not allowed: foo:barC -->
+ <basic.C foo:barC="o"/>
+ <!-- not allowed: barA, bar:barB -->
+ <basic.D barA="o" bar:barB="o"/>
+ <!-- not allowed: bar:barB -->
+ <inters.2_1 barA="o" bar:barB="o" foo:barC="o"/>
+ <!-- not allowed: barA, foo:barC -->
+ <inters.3_1 barA="o" bar:barB="o" foo:barC="o"/>
+ <!-- not allowed: bar:barB -->
+ <inters.4_1 barA="o" bar:barB="o" foo:barC="o"/>
+ <!-- not allowed: barA, foo:barC -->
+ <inters.6_1 barA="o" bar:barB="o" foo:barC="o"/>
+</foo>
+
+
diff --git a/libxml2/test/schemas/anyAttr-processContents-err1_0.xml b/libxml2/test/schemas/anyAttr-processContents-err1_0.xml
new file mode 100644
index 0000000..a0122f4
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-processContents-err1_0.xml
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO anyAttr-processContents1_0.xsd">
+ <elem.lax foo:bar="o o"/>
+ <elem.strict foo:barB="GB"/>
+</foo>
+
diff --git a/libxml2/test/schemas/anyAttr-processContents-err1_0.xsd b/libxml2/test/schemas/anyAttr-processContents-err1_0.xsd
new file mode 100644
index 0000000..cc2a0fd
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-processContents-err1_0.xsd
@@ -0,0 +1,26 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xsd:schema xmlns:foo="http://FOO"
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ targetNamespace="http://FOO">
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="elem.lax" type="foo:type.lax"/>
+ <xsd:element name="elem.strict" type="foo:type.strict"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:attribute name="bar" type="xsd:language" />
+
+ <xsd:complexType name="type.lax">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:complexType name="type.strict">
+ <xsd:anyAttribute namespace="##any" processContents="strict"/>
+ </xsd:complexType>
+
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/anyAttr-processContents1_0.xml b/libxml2/test/schemas/anyAttr-processContents1_0.xml
new file mode 100644
index 0000000..f821089
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-processContents1_0.xml
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO anyAttr-processContents1_0.xsd">
+ <elem.lax.A foo:barA_1="PL"/>
+ <elem.lax.B foo:barA_2="o"/>
+ <elem.strict foo:barB="FR"/>
+ <elem.skip foo:barC="o"/>
+</foo>
+
diff --git a/libxml2/test/schemas/anyAttr-processContents1_0.xsd b/libxml2/test/schemas/anyAttr-processContents1_0.xsd
new file mode 100644
index 0000000..a468702
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr-processContents1_0.xsd
@@ -0,0 +1,32 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xsd:schema xmlns:foo="http://FOO"
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ targetNamespace="http://FOO">
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="elem.lax.A" type="foo:type.lax"/>
+ <xsd:element name="elem.lax.B" type="foo:type.lax"/>
+ <xsd:element name="elem.strict" type="foo:type.strict"/>
+ <xsd:element name="elem.skip" type="foo:type.skip"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:attribute name="barA" type="xsd:language" />
+ <xsd:attribute name="barB" type="xsd:language" />
+
+ <xsd:complexType name="type.lax">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:complexType name="type.strict">
+ <xsd:anyAttribute namespace="##any"/>
+ </xsd:complexType>
+ <xsd:complexType name="type.skip">
+ <xsd:anyAttribute namespace="##any" processContents="skip"/>
+ </xsd:complexType>
+
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/anyAttr.importA.1_0.xsd b/libxml2/test/schemas/anyAttr.importA.1_0.xsd
new file mode 100644
index 0000000..92e0bbe
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr.importA.1_0.xsd
@@ -0,0 +1,24 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema" targetNamespace="http://IMPORT"
+ xmlns:imp="http://IMPORT" xmlns:boo="http://BOO">
+
+ <xsd:attributeGroup name="attrGr.inters.5_1">
+ <xsd:anyAttribute namespace="##other"/>
+ </xsd:attributeGroup>
+
+ <xsd:element name="imp.element"/>
+
+ <xsd:attribute name="imp.attribute" type="xsd:string"/>
+
+ <xsd:group name="imp.group">
+ <xsd:sequence>
+ <xsd:element ref="imp:imp.element"/>
+ </xsd:sequence>
+ </xsd:group>
+
+ <xsd:complexType name="imp.complexType">
+ <xsd:attribute ref="imp:imp.attribute"/>
+ </xsd:complexType>
+
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/anyAttr.importB.1_0.xsd b/libxml2/test/schemas/anyAttr.importB.1_0.xsd
new file mode 100644
index 0000000..33eaba8
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr.importB.1_0.xsd
@@ -0,0 +1,21 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+
+ <xsd:attributeGroup name="attrGr.inters.6_1">
+ <xsd:anyAttribute namespace="##other"/>
+ </xsd:attributeGroup>
+
+ <xsd:complexType name="imp.type.base.inters.4_1">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="imp.type.base.derive.4_1">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:complexType name="imp.type.base.derive.6">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/anyAttr1_0.xml b/libxml2/test/schemas/anyAttr1_0.xml
new file mode 100644
index 0000000..50b5b16
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr1_0.xml
@@ -0,0 +1,31 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:boo="http://BOO"
+ xmlns:import="http://IMPORT"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO anyAttr1_0.xsd">
+ <import:imp.element/>
+ <imp.attribute import:imp.attribute="p"/>
+ <imp.group>
+ <import:imp.element/>
+ </imp.group>
+ <basic.A bar:barA="o"/>
+ <basic.B bar:barB="o"/>
+ <basic.C barC="o"/>
+ <basic.D foo:barD="o"/>
+ <basic.E barA="o" bar:barB="o" foo:barC="o"/>
+ <inters.1_1 barA="o" bar:barB="o" foo:barC="o"/>
+ <inters.1_2 bar:barB="o"/>
+ <inters.1_3 barA="o" foo:barC="o"/>
+ <inters.1_4 barA="o" bar:barB="o" foo:barC="o"/>
+ <inters.2_1 barA="o" foo:barC="o"/>
+ <inters.3_1 bar:barB="o"/>
+ <inters.4_1 barA="o" foo:barC="o"/>
+ <!--inters.5_1 barA="o" bar:barB="o" foo:barC="o"/-->
+ <inters.6_1 bar:barB="o"/>
+</foo>
+
+
diff --git a/libxml2/test/schemas/anyAttr1_0.xsd b/libxml2/test/schemas/anyAttr1_0.xsd
new file mode 100644
index 0000000..1fcf898
--- /dev/null
+++ b/libxml2/test/schemas/anyAttr1_0.xsd
@@ -0,0 +1,144 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xsd:schema xmlns:foo="http://FOO" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:import="http://IMPORT"
+ targetNamespace="http://FOO" elementFormDefault="qualified">
+ <xsd:import namespace="http://IMPORT" schemaLocation="anyAttr.importA.1_0.xsd"/>
+ <xsd:import schemaLocation="anyAttr.importB.1_0.xsd"/>
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <!-- Import -->
+ <xsd:element ref="import:imp.element"/>
+ <xsd:element name="imp.attribute">
+ <xsd:complexType>
+ <xsd:attribute ref="import:imp.attribute"/>
+ </xsd:complexType>
+ </xsd:element>
+ <xsd:element name="imp.group">
+ <xsd:complexType>
+ <xsd:group ref="import:imp.group"/>
+ </xsd:complexType>
+ </xsd:element>
+ <!-- Basic -->
+ <xsd:element name="basic.A" type="foo:type.basic.A"/>
+ <xsd:element name="basic.B" type="foo:type.basic.B"/>
+ <xsd:element name="basic.C" type="foo:type.basic.C"/>
+ <xsd:element name="basic.D" type="foo:type.basic.D"/>
+ <xsd:element name="basic.E" type="foo:type.basic.E"/>
+ <!-- Attribute Wildcard Intersection -->
+ <xsd:element name="inters.1_1" type="foo:type.inters.1_1"/>
+ <xsd:element name="inters.1_2" type="foo:type.inters.1_2"/>
+ <xsd:element name="inters.1_3" type="foo:type.inters.1_3"/>
+ <xsd:element name="inters.1_4" type="foo:type.inters.1_4"/>
+
+ <xsd:element name="inters.2_1" type="foo:type.inters.2_1"/>
+
+ <xsd:element name="inters.3_1" type="foo:type.inters.3_1"/>
+
+ <xsd:element name="inters.4_1" type="foo:type.inters.4_1"/>
+
+ <!--xsd:element name="inters.5_1" type="type.inters.5_1"/-->
+ <xsd:element name="inters.6_1" type="foo:type.inters.6_1"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <!-- Basic -->
+ <xsd:complexType name="type.basic.A">
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:complexType name="type.basic.B">
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:complexType name="type.basic.C">
+ <xsd:anyAttribute namespace="##local" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:complexType name="type.basic.D">
+ <xsd:anyAttribute namespace="##targetNamespace" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:complexType name="type.basic.E">
+ <xsd:anyAttribute namespace="##targetNamespace ##local http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ <!-- Attribute Wildcard Intersection -->
+
+ <!-- 1. If O1 and O2 are the same value, then that value must be the value. -->
+ <xsd:complexType name="type.inters.1_1">
+ <xsd:attributeGroup ref="foo:attrGr.inters.1_1"/>
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.inters.1_1">
+ <xsd:anyAttribute namespace="##any"/>
+ </xsd:attributeGroup>
+ <xsd:complexType name="type.inters.1_2">
+ <xsd:attributeGroup ref="foo:attrGr.inters.1_2"/>
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.inters.1_2">
+ <xsd:anyAttribute namespace="##other"/>
+ </xsd:attributeGroup>
+ <xsd:complexType name="type.inters.1_3">
+ <xsd:attributeGroup ref="foo:attrGr.inters.1_3"/>
+ <xsd:anyAttribute namespace="##local ##targetNamespace" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.inters.1_3">
+ <xsd:anyAttribute namespace="##local ##targetNamespace"/>
+ </xsd:attributeGroup>
+ <xsd:complexType name="type.inters.1_4">
+ <xsd:attributeGroup ref="foo:attrGr.inters.1_4"/>
+ <xsd:anyAttribute namespace="##local http://BAR ##targetNamespace " processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.inters.1_4">
+ <xsd:anyAttribute namespace=" ##targetNamespace http://BAR ##local"/>
+ </xsd:attributeGroup>
+
+ <!-- 2. If either O1 or O2 is any, then the other must be the value. -->
+ <xsd:complexType name="type.inters.2_1">
+ <xsd:attributeGroup ref="foo:attrGr.inters.2_1"/>
+ <xsd:anyAttribute namespace="##any" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.inters.2_1">
+ <xsd:anyAttribute namespace="##local ##targetNamespace"/>
+ </xsd:attributeGroup>
+ <!-- 3. If either O1 or O2 is a pair of not and a value (a namespace name or ·absent·)
+ and the other is a set of (namespace names or ·absent·), then that set, minus the
+ negated value if it was in the set, minus ·absent· if it was in the set, must be the value. -->
+ <xsd:complexType name="type.inters.3_1">
+ <xsd:attributeGroup ref="foo:attrGr.inters.3_1"/>
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.inters.3_1">
+ <xsd:anyAttribute namespace="##local ##targetNamespace http://BAR"/>
+ </xsd:attributeGroup>
+ <!-- 4. If both O1 and O2 are sets of (namespace names or ·absent·), then the
+ intersection of those sets must be the value. -->
+ <xsd:complexType name="type.inters.4_1">
+ <xsd:attributeGroup ref="foo:attrGr.inters.4_1"/>
+ <xsd:anyAttribute namespace="##local ##targetNamespace http://BAR" processContents="lax"/>
+ </xsd:complexType>
+ <xsd:attributeGroup name="attrGr.inters.4_1">
+ <xsd:anyAttribute namespace="##local ##targetNamespace"/>
+ </xsd:attributeGroup>
+ <!-- 5. If the two are negations of different namespace names,
+ then the intersection is not expressible. -->
+ <!--
+ <xsd:complexType name="type.inters.5_1">
+ <xsd:attributeGroup ref="import:attrGr.inters.5_1"/>
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+ -->
+ <!--6. If the one is a negation of a namespace name and the other is a negation of ·absent·,
+ then the one which is the negation of a namespace name must be the value.
+
+ This one uses an attribute group from an imported schema with no targetNamespace.
+ -->
+ <xsd:complexType name="type.inters.6_1">
+ <xsd:attributeGroup ref="attrGr.inters.6_1"/>
+ <xsd:anyAttribute namespace="##other" processContents="lax"/>
+ </xsd:complexType>
+
+ <xsd:attributeGroup name="attrGrA">
+ <xsd:anyAttribute namespace="##targetNamespace"/>
+ </xsd:attributeGroup>
+
+</xsd:schema>
+
+
diff --git a/libxml2/test/schemas/attr0_0.xml b/libxml2/test/schemas/attr0_0.xml
new file mode 100644
index 0000000..cb5b1a6
--- /dev/null
+++ b/libxml2/test/schemas/attr0_0.xml
@@ -0,0 +1 @@
+<foo id="abc"/>
diff --git a/libxml2/test/schemas/attr0_0.xsd b/libxml2/test/schemas/attr0_0.xsd
new file mode 100644
index 0000000..d2031ba
--- /dev/null
+++ b/libxml2/test/schemas/attr0_0.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:simpleContent>
+ <xsd:extension base="xsd:string">
+ <xsd:attribute name="id" type="xsd:ID"/>
+ </xsd:extension>
+ </xsd:simpleContent>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/attruse_0_0.xml b/libxml2/test/schemas/attruse_0_0.xml
new file mode 100644
index 0000000..241ab27
--- /dev/null
+++ b/libxml2/test/schemas/attruse_0_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo>
+ <barA attr="bar"/>
+ <barB attr="bar"/>
+ <barB />
+ <barC/>
+</foo>
+
diff --git a/libxml2/test/schemas/attruse_0_0.xsd b/libxml2/test/schemas/attruse_0_0.xsd
new file mode 100644
index 0000000..bc9ccef
--- /dev/null
+++ b/libxml2/test/schemas/attruse_0_0.xsd
@@ -0,0 +1,32 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+
+ <xs:element name="barA" >
+ <xs:complexType>
+ <xs:attribute name="attr" type="xs:string" use="required" />
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="barB" >
+ <xs:complexType>
+ <xs:attribute name="attr" type="xs:string" use="optional" />
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="barC" >
+ <xs:complexType>
+ <xs:attribute name="attr" type="xs:string" use="prohibited" />
+ </xs:complexType>
+ </xs:element>
+
+ </xs:choice>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
+
diff --git a/libxml2/test/schemas/attruse_0_1.xml b/libxml2/test/schemas/attruse_0_1.xml
new file mode 100644
index 0000000..b857c6d
--- /dev/null
+++ b/libxml2/test/schemas/attruse_0_1.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo>
+ <barA />
+ <barB attr="bar"/>
+ <barB />
+ <barC/>
+</foo>
+
diff --git a/libxml2/test/schemas/attruse_0_2.xml b/libxml2/test/schemas/attruse_0_2.xml
new file mode 100644
index 0000000..f55ccdc
--- /dev/null
+++ b/libxml2/test/schemas/attruse_0_2.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo>
+ <barA attr="bar" />
+ <barB attr="bar"/>
+ <barB />
+ <barC attr="bar" />
+</foo>
+
diff --git a/libxml2/test/schemas/bug141312_0.xml b/libxml2/test/schemas/bug141312_0.xml
new file mode 100644
index 0000000..7d7abb1
--- /dev/null
+++ b/libxml2/test/schemas/bug141312_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo xmlns="http://FOO">lalala</foo>
diff --git a/libxml2/test/schemas/bug141312_0.xsd b/libxml2/test/schemas/bug141312_0.xsd
new file mode 100644
index 0000000..c9a7e2c
--- /dev/null
+++ b/libxml2/test/schemas/bug141312_0.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<schema
+ xmlns="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+
+ <element name="foo" type="foo:fooType" nillable="false" />
+
+ <complexType name="fooType" mixed="true">
+ <simpleContent>
+ <extension base="string" />
+ </simpleContent>
+ </complexType>
+
+</schema>
+
diff --git a/libxml2/test/schemas/bug141333.xml b/libxml2/test/schemas/bug141333.xml
new file mode 100644
index 0000000..e14aa46
--- /dev/null
+++ b/libxml2/test/schemas/bug141333.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="bug141333.xsd" attrA="valueA">
+
+ <bar attrA="valueA" attrB="valueB"/>
+
+</foo>
+
diff --git a/libxml2/test/schemas/bug141333.xsd b/libxml2/test/schemas/bug141333.xsd
new file mode 100644
index 0000000..1b81a7b
--- /dev/null
+++ b/libxml2/test/schemas/bug141333.xsd
@@ -0,0 +1,25 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="unqualified">
+
+ <xs:element name="foo" type="baseType"/>
+
+ <xs:complexType name="baseType">
+ <xs:all>
+ <xs:element name="bar" type="derivedType" minOccurs="0"/>
+ </xs:all>
+ <xs:attribute name="attrA" type="xs:string" use="required"/>
+ </xs:complexType>
+
+ <xs:complexType name="derivedType">
+ <xs:complexContent>
+ <xs:extension base="baseType">
+ <xs:attribute name="attrB" type="xs:string" use="required"/>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+
+</xs:schema>
+
+
+
+
diff --git a/libxml2/test/schemas/bug141333_0.xml b/libxml2/test/schemas/bug141333_0.xml
new file mode 100644
index 0000000..e14aa46
--- /dev/null
+++ b/libxml2/test/schemas/bug141333_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="bug141333.xsd" attrA="valueA">
+
+ <bar attrA="valueA" attrB="valueB"/>
+
+</foo>
+
diff --git a/libxml2/test/schemas/bug141333_0.xsd b/libxml2/test/schemas/bug141333_0.xsd
new file mode 100644
index 0000000..1b81a7b
--- /dev/null
+++ b/libxml2/test/schemas/bug141333_0.xsd
@@ -0,0 +1,25 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="unqualified">
+
+ <xs:element name="foo" type="baseType"/>
+
+ <xs:complexType name="baseType">
+ <xs:all>
+ <xs:element name="bar" type="derivedType" minOccurs="0"/>
+ </xs:all>
+ <xs:attribute name="attrA" type="xs:string" use="required"/>
+ </xs:complexType>
+
+ <xs:complexType name="derivedType">
+ <xs:complexContent>
+ <xs:extension base="baseType">
+ <xs:attribute name="attrB" type="xs:string" use="required"/>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+
+</xs:schema>
+
+
+
+
diff --git a/libxml2/test/schemas/bug143951.imp b/libxml2/test/schemas/bug143951.imp
new file mode 100644
index 0000000..58420d3
--- /dev/null
+++ b/libxml2/test/schemas/bug143951.imp
@@ -0,0 +1,12 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<xs:schema targetNamespace="http://www.newport-networks.com/NNL"
+xmlns:nnl="http://www.newport-networks.com/NNL"
+xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified"
+attributeFormDefault="unqualified" version="1.00">
+ <xs:group name="schema2group">
+ <xs:sequence>
+ <xs:element name="file" type="xs:string"
+default="$File$"/>
+ </xs:sequence>
+ </xs:group>
+</xs:schema>
diff --git a/libxml2/test/schemas/bug143951_0.xml b/libxml2/test/schemas/bug143951_0.xml
new file mode 100644
index 0000000..a742a0d
--- /dev/null
+++ b/libxml2/test/schemas/bug143951_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<MenuDefinitionFile xmlns:nnl="http://www.newport-networks.com/NNL"
+xmlns="http://www.newport-networks.com/cli"
+xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+xsi:schemaLocation="http://www.newport-networks.com/cli bug143951_0.xsd">
+ <nnl:file>$File: //depot/NNL/R1.0_SandM_Dev/Projects/SandM/src/uisupport
+/xml/cliTestCommands.xml $</nnl:file>
+</MenuDefinitionFile>
+
diff --git a/libxml2/test/schemas/bug143951_0.xsd b/libxml2/test/schemas/bug143951_0.xsd
new file mode 100644
index 0000000..d5c9511
--- /dev/null
+++ b/libxml2/test/schemas/bug143951_0.xsd
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<xs:schema targetNamespace="http://www.newport-networks.com/cli"
+ xmlns:nnl="http://www.newport-networks.com/NNL"
+ xmlns:cli="http://www.newport-networks.com/cli"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified" attributeFormDefault="unqualified"
+ version="1.00">
+ <xs:import namespace="http://www.newport-networks.com/NNL" schemaLocation="bug143951.imp"/>
+ <xs:element name="MenuDefinitionFile">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:group ref="nnl:schema2group"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
+
diff --git a/libxml2/test/schemas/bug145246.xsd.imp b/libxml2/test/schemas/bug145246.xsd.imp
new file mode 100644
index 0000000..7d92e1c
--- /dev/null
+++ b/libxml2/test/schemas/bug145246.xsd.imp
@@ -0,0 +1,119 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://purl.org/dc/elements/1.1/"
+ targetNamespace="http://purl.org/dc/elements/1.1/"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified">
+
+ <xs:annotation>
+ <xs:documentation xml:lang="en">
+ DCMES 1.1 XML Schema
+ XML Schema for http://purl.org/dc/elements/1.1/ namespace
+
+ Created 2003-04-02
+
+ Created by
+
+ Tim Cole (t-cole3@uiuc.edu)
+ Tom Habing (thabing@uiuc.edu)
+ Jane Hunter (jane@dstc.edu.au)
+ Pete Johnston (p.johnston@ukoln.ac.uk),
+ Carl Lagoze (lagoze@cs.cornell.edu)
+
+ This schema declares XML elements for the 15 DC elements from the
+ http://purl.org/dc/elements/1.1/ namespace.
+
+ It defines a complexType SimpleLiteral which permits mixed content
+ and makes the xml:lang attribute available. It disallows child elements by
+ use of minOcccurs/maxOccurs.
+
+ However, this complexType does permit the derivation of other complexTypes
+ which would permit child elements.
+
+ All elements are declared as substitutable for the abstract element any,
+ which means that the default type for all elements is dc:SimpleLiteral.
+
+ </xs:documentation>
+
+ </xs:annotation>
+
+
+ <xs:import namespace="http://www.w3.org/XML/1998/namespace"
+ schemaLocation="xml.xsd">
+ </xs:import>
+ <!--http://www.w3.org/2001/03/xml.xsd-->
+ <xs:complexType name="SimpleLiteral">
+ <xs:annotation>
+ <xs:documentation xml:lang="en">
+ This is the default type for all of the DC elements.
+ It permits text content only with optional
+ xml:lang attribute.
+ Text is allowed because mixed="true", but sub-elements
+ are disallowed because minOccurs="0" and maxOccurs="0"
+ are on the xs:any tag.
+
+ This complexType allows for restriction or extension permitting
+ child elements.
+ </xs:documentation>
+ </xs:annotation>
+
+ <xs:complexContent mixed="true">
+ <xs:restriction base="xs:anyType">
+ <xs:sequence>
+ <xs:any processContents="lax" minOccurs="1" maxOccurs="2"/>
+ </xs:sequence>
+ <xs:attribute ref="xml:lang" use="optional"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+
+ <xs:element name="any" type="SimpleLiteral" abstract="true"/>
+
+ <xs:element name="title" substitutionGroup="any"/>
+ <xs:element name="creator" substitutionGroup="any"/>
+ <xs:element name="subject" substitutionGroup="any"/>
+ <xs:element name="description" substitutionGroup="any"/>
+ <xs:element name="publisher" substitutionGroup="any"/>
+ <xs:element name="contributor" substitutionGroup="any"/>
+ <xs:element name="date" substitutionGroup="any"/>
+ <xs:element name="type" substitutionGroup="any"/>
+ <xs:element name="format" substitutionGroup="any"/>
+ <xs:element name="identifier" substitutionGroup="any"/>
+ <xs:element name="source" substitutionGroup="any"/>
+ <xs:element name="language" substitutionGroup="any"/>
+ <xs:element name="relation" substitutionGroup="any"/>
+ <xs:element name="coverage" substitutionGroup="any"/>
+ <xs:element name="rights" substitutionGroup="any"/>
+
+ <xs:group name="elementsGroup">
+ <xs:annotation>
+ <xs:documentation xml:lang="en">
+ This group is included as a convenience for schema authors
+ who need to refer to all the elements in the
+ http://purl.org/dc/elements/1.1/ namespace.
+ </xs:documentation>
+ </xs:annotation>
+
+ <xs:sequence>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="any"/>
+ </xs:choice>
+ </xs:sequence>
+ </xs:group>
+
+ <xs:complexType name="elementContainer">
+ <xs:annotation>
+ <xs:documentation xml:lang="en">
+ This complexType is included as a convenience for schema authors who need to define a root
+ or container element for all of the DC elements.
+ </xs:documentation>
+ </xs:annotation>
+
+ <xs:choice>
+ <xs:group ref="elementsGroup"/>
+ </xs:choice>
+ </xs:complexType>
+
+
+</xs:schema>
+
diff --git a/libxml2/test/schemas/bug145246_0.xml b/libxml2/test/schemas/bug145246_0.xml
new file mode 100644
index 0000000..09050c6
--- /dev/null
+++ b/libxml2/test/schemas/bug145246_0.xml
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--DOCTYPE giml SYSTEM "http://gitk.sourceforge.net/giml.dtd"-->
+<!-- $Id: gitkTemplate_message.xml.in,v 1.11 2004/01/07 14:21:17 ensonic Exp $
+ * @file gitkTemplate_message.xml
+ * @author Stefan Kost <ensonic@users.sf.net>
+ * @date Thu Jan 17 11:22:38 2002
+ *
+ * @brief message dialog template
+ * @ingroup gitkcore
+ *
+-->
+<giml xmlns="http://gitk.sourceforge.net/"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://gitk.sourceforge.net/ bug145246.xsd"
+ xmlns:dc="http://purl.org/dc/elements/1.1/"
+ xmlns:i18n="http://apache.org/cocoon/i18n/2.0"
+ >
+ <dialog focus="ctrl">
+ <meta>
+ <dc:title><i18n:text>message</i18n:text></dc:title>
+ </meta>
+ <dialogwidgets>
+ <dialogwidget id="Okay"/>
+ </dialogwidgets>
+ <widgetgroup>
+ <widget id="Message" type="label"/>
+ </widgetgroup>
+ </dialog>
+</giml>
+
diff --git a/libxml2/test/schemas/bug145246_0.xsd b/libxml2/test/schemas/bug145246_0.xsd
new file mode 100644
index 0000000..9cfe8c6
--- /dev/null
+++ b/libxml2/test/schemas/bug145246_0.xsd
@@ -0,0 +1,173 @@
+<?xml version="1.0" ?>
+<!--
+ * $Id: giml.xsd,v 1.3 2004/06/25 09:03:53 ensonic Exp $
+ * @file giml.xsd
+ * @author Stefan Kost <ensonic@users.sf.net>
+ * @date Thu Jun 24 17:28:26 MEST 2004
+ *
+ * @brief giml document schema definition
+ * @ingroup gitkcore
+ *
+-->
+<xs:schema targetNamespace="http://gitk.sourceforge.net/"
+ xmlns="http://gitk.sourceforge.net/"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:dc="http://purl.org/dc/elements/1.1/"
+ xmlns:i18n="http://apache.org/cocoon/i18n/2.0/">
+ <xs:annotation>
+ <xs:documentation>
+ This schema describes giml dialog sources
+ </xs:documentation>
+ </xs:annotation>
+
+ <xs:import namespace="http://purl.org/dc/elements/1.1/"
+ schemaLocation="bug145246.xsd.imp"
+ />
+ <!--xs:import namespace="http://apache.org/cocoon/i18n/2.0/"
+ schemaLocation="file://./i18n.xsd"
+ /-->
+
+ <!-- foreign namespace
+ <xs:element name="title">
+ <xs:complexType mixed="true">
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ </xs:choice>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="text">
+ <xs:complexType mixed="true"></xs:complexType>
+ </xs:element>
+ -->
+
+ <xs:element name="option">
+ <xs:complexType mixed="true">
+ <xs:choice minOccurs="0" maxOccurs="unbounded"></xs:choice>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="options">
+ <xs:complexType>
+ <xs:sequence minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="option"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="disabled">
+ <xs:complexType mixed="true"></xs:complexType>
+ </xs:element>
+
+ <xs:element name="required">
+ <xs:complexType mixed="true"></xs:complexType>
+ </xs:element>
+
+ <xs:element name="value">
+ <xs:complexType mixed="true"></xs:complexType>
+ </xs:element>
+
+ <xs:element name="label">
+ <xs:complexType mixed="true">
+ <xs:choice minOccurs="0" maxOccurs="1"></xs:choice>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="widget">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="meta" minOccurs="0"/>
+ <xs:element ref="label" minOccurs="0"/>
+ <xs:element ref="disabled" minOccurs="0"/>
+ <xs:element ref="value" minOccurs="0"/>
+ <xs:element ref="options" minOccurs="0"/>
+ </xs:sequence>
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="type" default="action">
+ <xs:simpleType>
+ <xs:restriction base="xs:string">
+ <xs:enumeration value="action"/>
+ <xs:enumeration value="characterinput"/>
+ <xs:enumeration value="characterinput_numeric"/>
+ <xs:enumeration value="characterinput_alphabetic"/>
+ <xs:enumeration value="optionchoice"/>
+ <xs:enumeration value="optionchoice_boolean"/>
+ <xs:enumeration value="optionchoice_single"/>
+ <xs:enumeration value="optionchoice_single_compact"/>
+ <xs:enumeration value="label"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ <xs:attribute name="hasFocus" default="false">
+ <xs:simpleType>
+ <xs:restriction base="xs:string">
+ <xs:enumeration value="true"/>
+ <xs:enumeration value="false"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="widgetgroup">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="meta" minOccurs="0"/>
+ <xs:element ref="label" minOccurs="0"/>
+ <xs:element ref="widget" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="widgetgroup" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="dialogwidget">
+ <xs:complexType mixed="true">
+ <xs:attribute name="id" type="xs:ID"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="dialogwidgets">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="dialogwidget" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="meta">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="dc:title"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="dialog">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="meta" minOccurs="0" maxOccurs="1"/>
+ <xs:element ref="dialogwidgets" minOccurs="0" maxOccurs="1"/>
+ <xs:element ref="widgetgroup" minOccurs="1" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="focus" default="main">
+ <xs:simpleType>
+ <xs:restriction base="xs:string">
+ <xs:enumeration value="main"/>
+ <xs:enumeration value="ctrl"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="giml">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="dialog" minOccurs="1" maxOccurs="1"/>
+ </xs:sequence>
+ <!--xs:attribute name="xmlns" type="xs:string" fixed="http://gitk.sourceforge.net/"/-->
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
+
diff --git a/libxml2/test/schemas/bug152470_1.xml b/libxml2/test/schemas/bug152470_1.xml
new file mode 100755
index 0000000..adca237
--- /dev/null
+++ b/libxml2/test/schemas/bug152470_1.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0"?>
+<roap:deviceHello
+ xmlns:roap="urn:oma:bac:dldrm:roap-1.0"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
+ <deviceID>
+ <keyIdentifier
+><hash>vXENc+Um/9/NvmYKiHDLaErK0gk=</hash></keyIdentifier>
+ </deviceID>
+</roap:deviceHello> \ No newline at end of file
diff --git a/libxml2/test/schemas/bug152470_1.xsd b/libxml2/test/schemas/bug152470_1.xsd
new file mode 100755
index 0000000..7fc9747
--- /dev/null
+++ b/libxml2/test/schemas/bug152470_1.xsd
@@ -0,0 +1,49 @@
+<?xml version="1.0"?>
+<schema
+ targetNamespace="urn:oma:bac:dldrm:roap-1.0"
+ xmlns="http://www.w3.org/2001/XMLSchema"
+ xmlns:roap="urn:oma:bac:dldrm:roap-1.0"
+ xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
+ xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"
+ elementFormDefault="unqualified"
+ attributeFormDefault="unqualified">
+<!-- Basic Types -->
+<complexType name="Request" abstract="true"/>
+<!-- Basic types to identify entities -->
+
+<complexType name="Identifier">
+ <choice>
+ <element name="keyIdentifier" type="roap:X509SPKIHash"/> <!-- was: type="roap:KeyIdentifier" -->
+ </choice>
+</complexType>
+
+<complexType name="KeyIdentifier" /> <!-- removed: abstract="true" -->
+
+<complexType name="X509SPKIHash">
+ <complexContent>
+ <extension base="roap:KeyIdentifier">
+ <sequence>
+ <element name="hash" type="base64Binary"/>
+ </sequence>
+ <attribute name="algorithm" type="anyURI"
+ default="http://www.w3.org/2000/09/xmldsig#sha1"/>
+ </extension>
+ </complexContent>
+</complexType>
+
+<element name="deviceHello" type="roap:DeviceHello"/>
+
+<complexType name="DeviceHello">
+ <complexContent>
+ <extension base="roap:Request">
+ <sequence>
+ <element name="deviceID" type="roap:Identifier"
+ maxOccurs="unbounded"/>
+ </sequence>
+ </extension>
+ </complexContent>
+</complexType>
+
+</schema>
+
+
diff --git a/libxml2/test/schemas/bug167754_0.xml b/libxml2/test/schemas/bug167754_0.xml
new file mode 100644
index 0000000..e5ec7d7
--- /dev/null
+++ b/libxml2/test/schemas/bug167754_0.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<test xmlns="http://www.example.com/Test"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://www.example.com/Test bug167754.xsd">
+ <child>
+ <foo/>
+ </child>
+ <child>
+ <foo/>
+ <joe/>
+ </child>
+</test>
diff --git a/libxml2/test/schemas/bug167754_0.xsd b/libxml2/test/schemas/bug167754_0.xsd
new file mode 100644
index 0000000..e7883d2
--- /dev/null
+++ b/libxml2/test/schemas/bug167754_0.xsd
@@ -0,0 +1,29 @@
+<?xml version="1.0"?>
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ xmlns:target="http://www.example.com/Test"
+ targetNamespace="http://www.example.com/Test"
+ version="1.0"
+ elementFormDefault="qualified" >
+
+ <xsd:element name="foo" />
+ <xsd:element name="bar" />
+ <xsd:element name="joe" />
+
+ <xsd:complexType name="dominik">
+ <xsd:all>
+ <xsd:element minOccurs="0" ref="target:foo" />
+ <xsd:element minOccurs="0" ref="target:bar" />
+ <xsd:element minOccurs="0" ref="target:joe" />
+ </xsd:all>
+ </xsd:complexType>
+
+ <xsd:element name="test">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element maxOccurs="unbounded" name="child" type="target:dominik" />
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/bug303566_1.xml b/libxml2/test/schemas/bug303566_1.xml
new file mode 100644
index 0000000..1bf56dc
--- /dev/null
+++ b/libxml2/test/schemas/bug303566_1.xml
@@ -0,0 +1,19 @@
+<?xml version="1.0"?>
+<Test
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="bug303566_1.xsd">
+ <Country code="D">
+ <City name="Berlin"
+ code="B">
+ <Part country="D"/>
+ <Part country="B"/>
+ </City>
+ </Country>
+ <Country code="F">
+ <City name="Paris" code="P">
+ <Part country="F"/>
+ <Part country="F"/>
+ </City>
+ </Country>
+</Test>
+
diff --git a/libxml2/test/schemas/bug303566_1.xsd b/libxml2/test/schemas/bug303566_1.xsd
new file mode 100644
index 0000000..fee99f7
--- /dev/null
+++ b/libxml2/test/schemas/bug303566_1.xsd
@@ -0,0 +1,63 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+
+ <xsd:simpleType name="codeType">
+ <xsd:restriction base="xsd:string">
+ <xsd:pattern value="[A-Z]+"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:element name="Test">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="Country"
+ maxOccurs="unbounded"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="Country">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="City"
+ maxOccurs="unbounded"/>
+ </xsd:sequence>
+ <xsd:attribute name="code"
+ type="codeType"
+ use="required"/>
+ </xsd:complexType>
+ <xsd:key name="CountryDummyKey">
+ <xsd:selector xpath="."/>
+ <xsd:field xpath="@code"/>
+ </xsd:key>
+ <xsd:keyref name="PartRefCountryDummy"
+ refer="CountryDummyKey">
+ <xsd:selector xpath=".//Part"/>
+ <xsd:field xpath="@country"/>
+ </xsd:keyref>
+ </xsd:element>
+
+ <xsd:element name="City">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="Part"
+ minOccurs="2"
+ maxOccurs="2"/>
+ </xsd:sequence>
+ <xsd:attribute name="name"
+ type="xsd:string"
+ use="required"/>
+ <xsd:attribute name="code"
+ type="xsd:string"
+ use="required"/>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="Part">
+ <xsd:complexType>
+ <xsd:attribute name="country"
+ type="codeType"
+ use="required"/>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/bug306806_0.xml b/libxml2/test/schemas/bug306806_0.xml
new file mode 100644
index 0000000..90c55e1
--- /dev/null
+++ b/libxml2/test/schemas/bug306806_0.xml
@@ -0,0 +1,111 @@
+<?xml version = '1.0'?>
+<targetGeometry
+ xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'
+ xsi:noNamespaceSchemaLocation='bug306806_1.xsd'>
+ <!-- type 1 cylinder (original) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <length dimension='L' Length='inch'> 30.250 </length>
+ <cyl-transform>
+ <translation dimension='L' Length='inch'> -13.125 0.000 0.000</translation>
+ <rotation dimension='L' Length='degree'> -0.000 90.000 0.000</rotation>
+ </cyl-transform>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+
+<geometryGroup name='g0'>
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+
+<geometryGroup name='g1'>
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+</geometryGroup>
+
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+</geometryGroup>
+
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+
+ <!-- type 2 cylinder (new, version2) -->
+ <component name="1502">
+ <description>/all/turbine/r.turbshaft</description>
+ <cylinder name="s.turbshaft">
+ <radius dimension='L' Length='inch'> 1.375 </radius>
+ <base1 dimension='L' Length='inch'> 0 0 0 </base1>
+ <base2 dimension='L' Length='inch'> 1.1 1.1 1.1 </base2>
+ <description>/all/turbine/r.turbshaft/s.turbshaft</description>
+ </cylinder>
+ </component>
+
+</targetGeometry>
diff --git a/libxml2/test/schemas/bug306806_1.xsd b/libxml2/test/schemas/bug306806_1.xsd
new file mode 100644
index 0000000..edc805d
--- /dev/null
+++ b/libxml2/test/schemas/bug306806_1.xsd
@@ -0,0 +1,544 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified">
+ <xs:element name="targetGeometry">
+ <xs:complexType>
+ <xs:group minOccurs="0" maxOccurs="unbounded" ref="geometry-element"/>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="geometryGroup" type="geometryGroup-content"/>
+ <xs:complexType name="geometryGroup-content">
+ <xs:group maxOccurs="unbounded" ref="geometry-element"/>
+ <xs:attribute name="name" use="required" type="xs:token"/>
+ </xs:complexType>
+ <xs:group name="geometry-element">
+ <xs:sequence>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="component"/>
+ <xs:element ref="geometryGroup"/>
+ </xs:choice>
+ </xs:sequence>
+ </xs:group>
+ <xs:element name="component">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element minOccurs="0" ref="description"/>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="cylinder"/>
+ <xs:element ref="ellipsoid"/>
+ <xs:element ref="faceSet"/>
+ <xs:element ref="tube"/>
+ <xs:element ref="sphere"/>
+ <xs:element ref="box"/>
+ <xs:element ref="extrusion"/>
+ </xs:choice>
+ </xs:sequence>
+ <xs:attributeGroup ref="name-attribute"/>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="translation">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="rotation">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="about">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="length">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:restriction base="xs:anyType">
+ <xs:simpleType>
+ <xs:restriction base="xs:double">
+ <xs:minExclusive value="0"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:restriction>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="radius">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:restriction base="xs:anyType">
+ <xs:simpleType>
+ <xs:restriction base="xs:double">
+ <xs:minExclusive value="0"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:restriction>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="base1">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="base2">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="transform">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element minOccurs="0" ref="translation"/>
+ <xs:element minOccurs="0" ref="rotation"/>
+ <xs:element minOccurs="0" ref="about"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="cyl-transform">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="translation"/>
+ <xs:element minOccurs="0" ref="rotation"/>
+ <xs:element minOccurs="0" ref="about"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="cylinder">
+ <xs:complexType>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="radius"/>
+ <xs:choice>
+ <xs:choice>
+ <xs:element ref="length"/>
+ <xs:element ref="cyl-transform"/>
+ </xs:choice>
+ <xs:choice>
+ <xs:element ref="base1"/>
+ <xs:element ref="base2"/>
+ <xs:element minOccurs="0" maxOccurs="unbounded" ref="transform"/>
+ </xs:choice>
+ </xs:choice>
+ <xs:element ref="description"/>
+ <xs:element ref="vMaterial"/>
+ </xs:choice>
+ <xs:attributeGroup ref="name-attribute"/>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="ellipsoid">
+ <xs:complexType>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element name="radius">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element ref="vMaterial"/>
+ <xs:element ref="transform"/>
+ </xs:choice>
+ <xs:attributeGroup ref="name-attribute"/>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="faceSet">
+ <xs:complexType>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="description"/>
+ <xs:element ref="vertex_normals"/>
+ <xs:element ref="vertices"/>
+ <xs:element ref="facets"/>
+ <xs:group ref="optional-content"/>
+ </xs:choice>
+ <xs:attribute name="name" type="xs:token"/>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="facets" type="facets-content"/>
+ <xs:simpleType name="facets-content">
+ <xs:restriction base="integer-list"/>
+ </xs:simpleType>
+ <xs:element name="vertex_normals" type="vertex_normals-content"/>
+ <xs:complexType name="vertex_normals-content">
+ <xs:simpleContent>
+ <xs:restriction base="xs:anyType">
+ <xs:simpleType>
+ <xs:restriction>
+ <xs:simpleType>
+ <xs:list>
+ <xs:simpleType>
+ <xs:union>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ </xs:union>
+ </xs:simpleType>
+ </xs:list>
+ </xs:simpleType>
+ <xs:minLength value="9"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:attributeGroup ref="length-attribute"/>
+ </xs:restriction>
+ </xs:simpleContent>
+ </xs:complexType>
+ <xs:element name="vertices" type="vertices-content"/>
+ <xs:complexType name="vertices-content">
+ <xs:simpleContent>
+ <xs:restriction base="xs:anyType">
+ <xs:simpleType>
+ <xs:restriction>
+ <xs:simpleType>
+ <xs:list>
+ <xs:simpleType>
+ <xs:union>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ </xs:union>
+ </xs:simpleType>
+ </xs:list>
+ </xs:simpleType>
+ <xs:minLength value="9"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:attributeGroup ref="length-attribute"/>
+ </xs:restriction>
+ </xs:simpleContent>
+ </xs:complexType>
+ <xs:element name="tube" type="tube-content"/>
+ <xs:complexType name="tube-content">
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="spine"/>
+ <xs:element ref="radius"/>
+ <xs:group ref="optional-content"/>
+ </xs:choice>
+ <xs:attributeGroup ref="name-attribute"/>
+ </xs:complexType>
+ <xs:element name="spine" type="spine-content"/>
+ <xs:complexType name="spine-content">
+ <xs:simpleContent>
+ <xs:restriction base="xs:anyType">
+ <xs:simpleType>
+ <xs:restriction>
+ <xs:simpleType>
+ <xs:list>
+ <xs:simpleType>
+ <xs:union>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ </xs:union>
+ </xs:simpleType>
+ </xs:list>
+ </xs:simpleType>
+ <xs:minLength value="6"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:attributeGroup ref="length-attribute"/>
+ </xs:restriction>
+ </xs:simpleContent>
+ </xs:complexType>
+ <xs:element name="sphere" type="sphere-content"/>
+ <xs:complexType name="sphere-content">
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="radius"/>
+ <xs:element ref="position"/>
+ </xs:choice>
+ <xs:attributeGroup ref="name-attribute"/>
+ </xs:complexType>
+ <xs:element name="position" type="position-content"/>
+ <xs:complexType name="position-content">
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ <xs:element name="box" type="box-content"/>
+ <xs:complexType name="box-content">
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="size"/>
+ <xs:choice>
+ <xs:element ref="position"/>
+ <xs:element ref="transform"/>
+ </xs:choice>
+ </xs:choice>
+ <xs:attributeGroup ref="name-attribute"/>
+ </xs:complexType>
+ <xs:element name="size" type="size-content"/>
+ <xs:complexType name="size-content">
+ <xs:simpleContent>
+ <xs:extension base="three-doubles-list">
+ <xs:attributeGroup ref="length-attribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ <xs:element name="extrusion" type="extrusion-content"/>
+ <xs:complexType name="extrusion-content">
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="spine"/>
+ <xs:element ref="scale"/>
+ <xs:element ref="crossSection"/>
+ <xs:group ref="optional-content"/>
+ </xs:choice>
+ <xs:attributeGroup ref="name-attribute"/>
+ </xs:complexType>
+ <xs:element name="scale" type="scale-content"/>
+ <xs:simpleType name="scale-content">
+ <xs:restriction>
+ <xs:simpleType>
+ <xs:list>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double"/>
+ </xs:simpleType>
+ </xs:list>
+ </xs:simpleType>
+ <xs:minLength value="2"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:element name="crossSection" type="crossSection-content"/>
+ <xs:complexType name="crossSection-content">
+ <xs:simpleContent>
+ <xs:restriction base="xs:anyType">
+ <xs:simpleType>
+ <xs:restriction>
+ <xs:simpleType>
+ <xs:list>
+ <xs:simpleType>
+ <xs:union>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ </xs:union>
+ </xs:simpleType>
+ </xs:list>
+ </xs:simpleType>
+ <xs:minLength value="9"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:attributeGroup ref="length-attribute"/>
+ <xs:attributeGroup ref="closed-attribute"/>
+ </xs:restriction>
+ </xs:simpleContent>
+ </xs:complexType>
+ <xs:attributeGroup name="closed-attribute">
+ <xs:attribute name="closed" use="required" type="xs:boolean"/>
+ </xs:attributeGroup>
+ <xs:group name="optional-content">
+ <xs:annotation>
+ <xs:documentation>global #############</xs:documentation>
+ </xs:annotation>
+ <xs:sequence>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="transform"/>
+ <xs:element ref="vMaterial"/>
+ </xs:choice>
+ </xs:sequence>
+ </xs:group>
+ <xs:element name="description" type="xs:string"/>
+ <xs:attributeGroup name="length-attribute">
+ <xs:attributeGroup ref="dimension-attribute"/>
+ <xs:attributeGroup ref="Length-attribute"/>
+ </xs:attributeGroup>
+ <xs:attributeGroup name="dimension-attribute">
+ <xs:attribute name="dimension" use="required">
+ <xs:simpleType>
+ <xs:restriction base="xs:token">
+ <xs:enumeration value="L"/>
+ <xs:enumeration value="F"/>
+ <xs:enumeration value="M"/>
+ <xs:enumeration value="T"/>
+ <xs:enumeration value="F/L"/>
+ <xs:enumeration value="F/LL"/>
+ <xs:enumeration value="F/LLL"/>
+ <xs:enumeration value="F/T"/>
+ <xs:enumeration value="F/TT"/>
+ <xs:enumeration value="F/TTT"/>
+ <xs:enumeration value="L/T"/>
+ <xs:enumeration value="L/TT"/>
+ <xs:enumeration value="LLLLL"/>
+ <xs:enumeration value="D/D"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:attributeGroup>
+ <xs:attributeGroup name="Length-attribute">
+ <xs:attribute name="Length" use="required">
+ <xs:simpleType>
+ <xs:restriction base="xs:token">
+ <xs:enumeration value="meter"/>
+ <xs:enumeration value="m"/>
+ <xs:enumeration value="foot"/>
+ <xs:enumeration value="f"/>
+ <xs:enumeration value="inch"/>
+ <xs:enumeration value="in"/>
+ <xs:enumeration value="centimeter"/>
+ <xs:enumeration value="cm"/>
+ <xs:enumeration value="decimeter"/>
+ <xs:enumeration value="dm"/>
+ <xs:enumeration value="millimeter"/>
+ <xs:enumeration value="mm"/>
+ <xs:enumeration value="degree"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:attributeGroup>
+ <xs:attributeGroup name="Time-attribute">
+ <xs:attribute name="Time" use="required">
+ <xs:simpleType>
+ <xs:restriction base="xs:token">
+ <xs:enumeration value="second"/>
+ <xs:enumeration value="s"/>
+ <xs:enumeration value="sec"/>
+ <xs:enumeration value="minute"/>
+ <xs:enumeration value="min"/>
+ <xs:enumeration value="hour"/>
+ <xs:enumeration value="hr"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:attributeGroup>
+ <xs:attributeGroup name="Force-attribute">
+ <xs:attribute name="Force" use="required">
+ <xs:simpleType>
+ <xs:restriction base="xs:token">
+ <xs:enumeration value="newton"/>
+ <xs:enumeration value="n"/>
+ <xs:enumeration value="pound"/>
+ <xs:enumeration value="grain"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:attributeGroup>
+ <xs:attributeGroup name="Mass-attribute">
+ <xs:attribute name="Mass" use="required">
+ <xs:simpleType>
+ <xs:restriction base="xs:token">
+ <xs:enumeration value="kilogram"/>
+ <xs:enumeration value="kg"/>
+ <xs:enumeration value="gram"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:attributeGroup>
+ <xs:attributeGroup name="Dimensionless-attribute">
+ <xs:attribute name="Dimensionless" use="required">
+ <xs:simpleType>
+ <xs:restriction base="xs:token">
+ <xs:enumeration value="radian"/>
+ <xs:enumeration value="rad"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ </xs:attributeGroup>
+ <xs:simpleType name="three-doubles-list">
+ <xs:restriction>
+ <xs:simpleType>
+ <xs:list>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:double xs:double xs:double"/>
+ </xs:simpleType>
+ </xs:list>
+ </xs:simpleType>
+ <xs:length value="3"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="integer-list">
+ <xs:restriction>
+ <xs:simpleType>
+ <xs:list>
+ <xs:simpleType>
+ <xs:union memberTypes="xs:integer xs:integer"/>
+ </xs:simpleType>
+ </xs:list>
+ </xs:simpleType>
+ <xs:minLength value="1"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:attributeGroup name="name-attribute">
+ <xs:attribute name="name" use="required" type="xs:token"/>
+ </xs:attributeGroup>
+ <xs:attributeGroup name="description-attribute">
+ <xs:attribute name="description" use="required"/>
+ </xs:attributeGroup>
+ <xs:element name="vMaterial">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element minOccurs="0" ref="diffuseColor"/>
+ <xs:element minOccurs="0" ref="emissiveColor"/>
+ <xs:element minOccurs="0" ref="specularColor"/>
+ <xs:element minOccurs="0" ref="shininess"/>
+ <xs:element minOccurs="0" ref="transparency"/>
+ <xs:element minOccurs="0" ref="ambientIntensity"/>
+ <xs:element minOccurs="0" ref="DEF"/>
+ <xs:element minOccurs="0" ref="USE"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="diffuseColor" type="xs:string"/>
+ <xs:element name="emissiveColor" type="xs:string"/>
+ <xs:element name="specularColor" type="xs:string"/>
+ <xs:element name="shininess" type="xs:string"/>
+ <xs:element name="transparency" type="xs:string"/>
+ <xs:element name="ambientIntensity" type="xs:string"/>
+ <xs:element name="DEF" type="xs:string"/>
+ <xs:element name="USE" type="xs:string"/>
+</xs:schema>
diff --git a/libxml2/test/schemas/bug309338_0.xml b/libxml2/test/schemas/bug309338_0.xml
new file mode 100644
index 0000000..33cbf95
--- /dev/null
+++ b/libxml2/test/schemas/bug309338_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<foo xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo bug309338.xsd">2000.00</foo>
diff --git a/libxml2/test/schemas/bug309338_1.xsd b/libxml2/test/schemas/bug309338_1.xsd
new file mode 100644
index 0000000..0aa586c
--- /dev/null
+++ b/libxml2/test/schemas/bug309338_1.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ xmlns:f="urn:test:foo"
+ targetNamespace="urn:test:foo">
+ <xsd:element name="foo" type="f:fooType"/>
+
+ <xsd:simpleType name="fooType">
+ <xsd:restriction base="xsd:decimal">
+ <xsd:minExclusive value="0"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/bug310264_0.xml b/libxml2/test/schemas/bug310264_0.xml
new file mode 100644
index 0000000..98f057c
--- /dev/null
+++ b/libxml2/test/schemas/bug310264_0.xml
@@ -0,0 +1,41 @@
+<c xmlns="http://myns" >
+ <a/> <!-- 1 -->
+ <a/> <!-- 2 -->
+ <a/> <!-- 3 -->
+ <a/> <!-- 4 -->
+ <a/> <!-- 5 -->
+ <a/> <!-- 6 -->
+ <a/> <!-- 7 -->
+ <a/> <!-- 8 -->
+ <a/> <!-- 9 -->
+ <a/> <!-- 10 -->
+ <a/> <!-- 1 -->
+ <a/> <!-- 2 -->
+ <a/> <!-- 3 -->
+ <a/> <!-- 4 -->
+ <a/> <!-- 5 -->
+ <a/> <!-- 6 -->
+ <a/> <!-- 7 -->
+ <a/> <!-- 8 -->
+ <a/> <!-- 9 -->
+ <a/> <!-- 20 -->
+ <a/> <!-- 1 -->
+ <a/> <!-- 2 -->
+ <a/> <!-- 3 -->
+ <a/> <!-- 4 -->
+ <a/> <!-- 5 -->
+ <a/> <!-- 6 -->
+ <a/> <!-- 7 -->
+ <a/> <!-- 8 -->
+ <a/> <!-- 9 -->
+ <a/> <!-- 30 -->
+ <a/> <!-- 1 -->
+ <a/> <!-- 2 -->
+ <a/> <!-- 3 -->
+ <a/> <!-- 4 -->
+ <a/> <!-- 5 -->
+ <a/> <!-- 6 -->
+ <a/> <!-- 7 -->
+ <a/> <!-- 8 -->
+</c>
+
diff --git a/libxml2/test/schemas/bug310264_0.xsd b/libxml2/test/schemas/bug310264_0.xsd
new file mode 100644
index 0000000..6f2b333
--- /dev/null
+++ b/libxml2/test/schemas/bug310264_0.xsd
@@ -0,0 +1,18 @@
+<xs:schema xmlns:tns="http://myns"
+ targetNamespace="http://myns"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+>
+
+ <xs:element name="a" />
+
+ <xs:complexType name="c" >
+ <xs:sequence minOccurs="2" maxOccurs="4">
+ <xs:sequence minOccurs="19" maxOccurs="20">
+ <xs:element ref="tns:a" />
+ </xs:sequence>
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:element name="c" type="tns:c" />
+
+</xs:schema>
diff --git a/libxml2/test/schemas/bug312957_0.xml b/libxml2/test/schemas/bug312957_0.xml
new file mode 100644
index 0000000..c22444f
--- /dev/null
+++ b/libxml2/test/schemas/bug312957_0.xml
@@ -0,0 +1,14 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<family xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="bug312957_1.xsd"
+ name="test">
+ <siblings>
+ <sibling name="gill"/>
+ </siblings>
+ <sisters>
+ <sister name="gill"/>
+ <sister name="annie"/>
+ </sisters>
+</family>
+
+
diff --git a/libxml2/test/schemas/bug312957_1.xsd b/libxml2/test/schemas/bug312957_1.xsd
new file mode 100644
index 0000000..fb7972e
--- /dev/null
+++ b/libxml2/test/schemas/bug312957_1.xsd
@@ -0,0 +1,39 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:element name="family" type="family_type">
+ <xs:key name="sibling_key">
+ <xs:selector xpath="siblings/sibling"/>
+ <xs:field xpath="@name"/>
+ </xs:key>
+ <xs:keyref name="sibling_key_ref" refer="sibling_key">
+ <xs:selector xpath="sisters/sister"/>
+ <xs:field xpath="@name"/>
+ </xs:keyref>
+ </xs:element>
+ <xs:complexType name="family_type">
+ <xs:sequence>
+ <xs:element name="siblings" type="siblings_type" />
+ <xs:element name="sisters" type="sisters_type" />
+ </xs:sequence>
+ <xs:attribute name="name" type="xs:string"/>
+ </xs:complexType>
+ <xs:complexType name="siblings_type">
+ <xs:sequence>
+ <xs:element name="sibling" type="sibling_type" minOccurs="0"
+maxOccurs="unbounded" />
+ </xs:sequence>
+ </xs:complexType>
+ <xs:complexType name="sisters_type">
+ <xs:sequence>
+ <xs:element name="sister" type="sister_type" minOccurs="0"
+maxOccurs="unbounded" />
+ </xs:sequence>
+ </xs:complexType>
+ <xs:complexType name="sibling_type">
+ <xs:attribute name="name" type="xs:string"/>
+ </xs:complexType>
+ <xs:complexType name="sister_type">
+ <xs:attribute name="name" type="xs:string"/>
+ </xs:complexType>
+</xs:schema>
diff --git a/libxml2/test/schemas/bug313982_0.xml b/libxml2/test/schemas/bug313982_0.xml
new file mode 100644
index 0000000..18c81ea
--- /dev/null
+++ b/libxml2/test/schemas/bug313982_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<testDecimalFacet xmlns="http://www.foo.com"
+xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://www.foo.com bug313982_0.xsd">0.99</testDecimalFacet>
diff --git a/libxml2/test/schemas/bug313982_0.xsd b/libxml2/test/schemas/bug313982_0.xsd
new file mode 100644
index 0000000..69d0613
--- /dev/null
+++ b/libxml2/test/schemas/bug313982_0.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xsd:schema targetNamespace="http://www.foo.com" elementFormDefault="qualified"
+xmlns="http://www.foo.com" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="testDecimalFacet">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:decimal">
+ <xsd:minInclusive value="0"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/bug321475_0.xml b/libxml2/test/schemas/bug321475_0.xml
new file mode 100644
index 0000000..6190231
--- /dev/null
+++ b/libxml2/test/schemas/bug321475_0.xml
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="iso-8859-1"?>
+<animation xmlns="http://www.collada.org/2005/11/COLLADASchema"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://www.collada.org/2005/11/COLLADASchema bug321475.xsd">
+ <asset/>
+ <source/>
+ <sampler/>
+ <channel/>
+</animation>
+
diff --git a/libxml2/test/schemas/bug321475_1.xsd b/libxml2/test/schemas/bug321475_1.xsd
new file mode 100644
index 0000000..b714a0d
--- /dev/null
+++ b/libxml2/test/schemas/bug321475_1.xsd
@@ -0,0 +1,48 @@
+<?xml version="1.0"?>
+<xs:schema targetNamespace="http://www.collada.org/2005/11/COLLADASchema"
+ xmlns="http://www.collada.org/2005/11/COLLADASchema"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ elementFormDefault="qualified" version="1.4.0" xml:lang="EN">
+ <xs:element name="animation">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="asset" minOccurs="0"/>
+ <xs:choice>
+ <xs:sequence>
+ <xs:element ref="source" maxOccurs="unbounded"/>
+ <xs:choice>
+ <xs:sequence>
+ <xs:element ref="sampler" maxOccurs="unbounded"/>
+ <xs:element ref="channel" maxOccurs="unbounded"/>
+ <xs:element ref="animation" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:element ref="animation" maxOccurs="unbounded"/>
+ </xs:choice>
+ </xs:sequence>
+ <xs:sequence>
+ <xs:element ref="sampler" maxOccurs="unbounded"/>
+ <xs:element ref="channel" maxOccurs="unbounded"/>
+ <xs:element ref="animation" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:element ref="animation" maxOccurs="unbounded"/>
+ </xs:choice>
+ <xs:element ref="extra" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="name" type="xs:NCName"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="extra"/>
+ <xs:element name="asset"/>
+ <xs:element name="channel"/>
+ <xs:element name="sampler"/>
+ <xs:element name="source"/>
+ <xs:element name="technique"/>
+</xs:schema>
+
+
+
+
+ \ No newline at end of file
diff --git a/libxml2/test/schemas/bug322411_0.xml b/libxml2/test/schemas/bug322411_0.xml
new file mode 100644
index 0000000..f883648
--- /dev/null
+++ b/libxml2/test/schemas/bug322411_0.xml
@@ -0,0 +1,93 @@
+<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
+<ELEMENTS>
+ <ELEMENT>
+ <items>
+ <item>1</item>
+ <item>2</item>
+ <item>3</item>
+ <item>4</item>
+ <item>5</item>
+ <!-- Some dupls. -->
+ <item>dupl1</item>
+ <item>dupl2</item>
+ <item>dupl3</item>
+ <item>dupl4</item>
+ <item>dupl5</item>
+ <item>dupl6</item>
+ <item>dupl7</item>
+ <item>dupl8</item>
+ <item>dupl9</item>
+ <item>dupl10</item>
+ <item>dupl11</item>
+
+ <item>6</item>
+ <item>7</item>
+ <item>8</item>
+ <item>9</item>
+ <item>10</item>
+ <item>11</item>
+ <items>
+ <item>12</item>
+ <item>13</item>
+ <item>14</item>
+ <item>15</item>
+ <!-- Some dupls. -->
+ <item>dupl1</item>
+ <item>dupl2</item>
+ <item>dupl3</item>
+ <item>dupl4</item>
+ <item>dupl5</item>
+ <item>dupl6</item>
+ <item>dupl7</item>
+ <item>dupl8</item>
+ <item>dupl9</item>
+ <item>dupl10</item>
+ <item>dupl11</item>
+
+ <item>16</item>
+ <item>17</item>
+ <item>18</item>
+ <item>19</item>
+ <item>20</item>
+ <item>21</item>
+ </items>
+ <items>
+ <item>22</item>
+ <item>23</item>
+ <item>24</item>
+ <item>25</item>
+ <item>26</item>
+ <item>27</item>
+ <item>28</item>
+ <item>29</item>
+ <item>30</item>
+ <item>31</item>
+ <item>32</item>
+ <item>33</item>
+ <item>34</item>
+ <item>35</item>
+ <item>36</item>
+ <item>37</item>
+ <item>38</item>
+ <item>39</item>
+ <item>40</item>
+ <item>41</item>
+ <!-- Some dupls. -->
+ <item>dupl1</item>
+ <item>dupl2</item>
+ <item>dupl3</item>
+ <item>dupl4</item>
+ <item>dupl5</item>
+ <item>dupl6</item>
+ <item>dupl7</item>
+ <item>dupl8</item>
+ <item>dupl9</item>
+ <item>dupl10</item>
+ <item>dupl11</item>
+ </items>
+ </items>
+ <!-- Keyrefs. -->
+ <ref>41</ref>
+ </ELEMENT>
+</ELEMENTS>
+
diff --git a/libxml2/test/schemas/bug322411_1.xsd b/libxml2/test/schemas/bug322411_1.xsd
new file mode 100644
index 0000000..383dee6
--- /dev/null
+++ b/libxml2/test/schemas/bug322411_1.xsd
@@ -0,0 +1,35 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+
+ <xsd:element name="items">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="item" maxOccurs="unbounded" type="xsd:string"/>
+ <xsd:element ref="items" minOccurs="0" maxOccurs="2"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ <xsd:unique name="ItemUnique">
+ <xsd:selector xpath="item"/>
+ <xsd:field xpath="."/>
+ </xsd:unique>
+ </xsd:element>
+
+ <xsd:element name="ELEMENTS">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="ELEMENT">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="items"/>
+ <xsd:element name="ref" type="xsd:string" maxOccurs="unbounded"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ <xsd:keyref name="ItemRef" refer="ItemUnique">
+ <xsd:selector xpath="ref"/>
+ <xsd:field xpath="."/>
+ </xsd:keyref>
+ </xsd:element>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/bug323510_0.xml b/libxml2/test/schemas/bug323510_0.xml
new file mode 100644
index 0000000..ce7647d
--- /dev/null
+++ b/libxml2/test/schemas/bug323510_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="iso-8859-1"?>
+<foo/>
+
diff --git a/libxml2/test/schemas/bug323510_1.xsd b/libxml2/test/schemas/bug323510_1.xsd
new file mode 100644
index 0000000..8b047ce
--- /dev/null
+++ b/libxml2/test/schemas/bug323510_1.xsd
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="bar" minOccurs="1" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/bug455953_0.xml b/libxml2/test/schemas/bug455953_0.xml
new file mode 100644
index 0000000..448907c
--- /dev/null
+++ b/libxml2/test/schemas/bug455953_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<pre:MainElement xmlns:pre="http://www.tempuri.org/MainSchema" xmlns:ns="http://www.tempuri.org/ImportedSchema">
+ <pre:MainA MainID="1"/>
+ <ns:AnotherElement>
+ <ns:B BID="3">
+ <ns:MyB>EMPTY</ns:MyB>
+ </ns:B>
+ </ns:AnotherElement>
+</pre:MainElement> \ No newline at end of file
diff --git a/libxml2/test/schemas/bug455953_0.xsd b/libxml2/test/schemas/bug455953_0.xsd
new file mode 100644
index 0000000..f635570
--- /dev/null
+++ b/libxml2/test/schemas/bug455953_0.xsd
@@ -0,0 +1,29 @@
+<?xml version="1.0" encoding="UTF-8" ?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://www.tempuri.org/MainSchema"
+ xmlns:tns="http://www.tempuri.org/MainSchema"
+ xmlns:ns="http://www.tempuri.org/ImportedSchema"
+ elementFormDefault="qualified" >
+
+ <xs:import namespace="http://www.tempuri.org/ImportedSchema" schemaLocation="./import-455953.xsd" />
+
+ <xs:complexType name="MyMainType">
+ <xs:sequence>
+ <xs:element name="MainA">
+ <xs:complexType>
+ <xs:attribute name="MainID" type="xs:int"/>
+ </xs:complexType>
+ </xs:element>
+ <xs:element ref="ns:AnotherElement" />
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:element name="MainElement" type="tns:MyMainType">
+ <xs:key name="MainKey" >
+ <xs:selector xpath="tns:MainA" />
+ <xs:field xpath="@MainID" />
+ </xs:key>
+ </xs:element>
+
+
+</xs:schema>
diff --git a/libxml2/test/schemas/changelog093_0.xml b/libxml2/test/schemas/changelog093_0.xml
new file mode 100644
index 0000000..4b49612
--- /dev/null
+++ b/libxml2/test/schemas/changelog093_0.xml
@@ -0,0 +1,14 @@
+<?xml version="1.0"?>
+<changelog
+ xmlns="http://www.blackperl.com/XML/ChangeLog"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://www.blackperl.com/XML/ChangeLog changelog093.xsd">
+ <description lang="PL"/>
+ <description lang="PL"/>
+ <release version="1" date="2005-04-08T21:12:00">
+ <item>
+ <file path="abc"/>
+ <description lang="FR"/>
+ </item>
+ </release>
+</changelog>
diff --git a/libxml2/test/schemas/changelog093_1.xsd b/libxml2/test/schemas/changelog093_1.xsd
new file mode 100644
index 0000000..cf2bcc6
--- /dev/null
+++ b/libxml2/test/schemas/changelog093_1.xsd
@@ -0,0 +1,253 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ xmlns:tns="http://www.blackperl.com/XML/ChangeLog"
+ targetNamespace="http://www.blackperl.com/XML/ChangeLog"
+ elementFormDefault="qualified" attributeFormDefault="unqualified"
+ version="0.93" id="changelog0.93">
+ <!--
+ Refer to this schema using the following namespace:
+ http://www.blackperl.com/XML/ChangeLog
+ -->
+ <xsd:annotation>
+ <xsd:documentation>
+ A description of an XML application which itemizes changes over the
+ life-span of a software project. Changes are tracked by releases, with a
+ granularity of individual items made up of files that were affected.
+ </xsd:documentation>
+ <xsd:appinfo xmlns:dc="http://purl.org/dc/elements/1.1/">
+ <dc:creator>Randy J. Ray (rjray@blackperl.com)</dc:creator>
+ <dc:date>2004-11-22</dc:date>
+ <dc:subject>changelog,xml,schema</dc:subject>
+ <dc:description>
+ An XML Schema declaration describing an XML expression of software
+ project change-logs.
+ </dc:description>
+ </xsd:appinfo>
+ <xsd:appinfo>
+ <rdf:RDF xmlns:cc="http://web.resource.org/cc/"
+ xmlns:dc="http://purl.org/dc/elements/1.1/"
+ xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
+ <cc:Work rdf:about="">
+ <dc:title>XML Schema for Changelogs</dc:title>
+ <dc:description>
+ An XML Schema declaration describing an XML expression of software
+ project change-logs.
+ </dc:description>
+ <dc:creator>
+ <cc:Agent>
+ <dc:title>Randy J. Ray</dc:title>
+ </cc:Agent>
+ </dc:creator>
+ <dc:rights>
+ <cc:Agent>
+ <dc:title>Randy J. Ray</dc:title>
+ </cc:Agent>
+ </dc:rights>
+ <dc:type rdf:resource="http://purl.org/dc/dcmitype/Text" />
+ <cc:license rdf:resource="http://creativecommons.org/licenses/by-sa/2.0/" />
+ </cc:Work>
+ <cc:License rdf:about="http://creativecommons.org/licenses/by-sa/2.0/">
+ <cc:permits rdf:resource="http://web.resource.org/cc/Reproduction" />
+ <cc:permits rdf:resource="http://web.resource.org/cc/Distribution" />
+ <cc:requires rdf:resource="http://web.resource.org/cc/Notice" />
+ <cc:requires rdf:resource="http://web.resource.org/cc/Attribution" />
+ <cc:permits rdf:resource="http://web.resource.org/cc/DerivativeWorks" />
+ <cc:requires rdf:resource="http://web.resource.org/cc/ShareAlike" />
+ </cc:License>
+ </rdf:RDF>
+ </xsd:appinfo>
+ </xsd:annotation>
+
+ <xsd:complexType id="informationType" name="informationType"
+ mixed="true">
+ <xsd:annotation>
+ <xsd:documentation>
+ An open-ended container type for including version-control information
+ at various levels within the changelog structure. This is the only
+ type which explicitly permits content from foreign namespaces.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:sequence maxOccurs="unbounded" minOccurs="0">
+ <xsd:any processContents="lax" />
+ </xsd:sequence>
+ <xsd:attribute name="source" type="xsd:anyURI" />
+ <xsd:anyAttribute namespace="##other" processContents="lax" />
+ </xsd:complexType>
+
+ <xsd:complexType id="descriptionType" name="descriptionType">
+ <xsd:annotation>
+ <xsd:documentation>
+ A description block is used to document everything from specific change
+ items to the release as a whole.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:simpleContent>
+ <xsd:extension base="xsd:string">
+ <xsd:attribute default="en-US" name="lang" type="xsd:language" />
+ </xsd:extension>
+ </xsd:simpleContent>
+ </xsd:complexType>
+
+ <xsd:simpleType id="versionString" name="versionString">
+ <xsd:annotation>
+ <xsd:documentation>
+ The versionString type is applied to attributes that describe simple
+ revision-number strings. It only supports CVS (RCS) styled version
+ numbers.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:restriction base="xsd:string">
+ <xsd:pattern value="\d+(\.\d+)*" />
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:complexType id="fileType" name="fileType">
+ <xsd:annotation>
+ <xsd:documentation>
+ The fileType definition is used for the file element, a part of the
+ itemType declaration. It is defined separately so that it can be
+ referred to from multiple places.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:sequence maxOccurs="1" minOccurs="0">
+ <xsd:element name="description" type="tns:descriptionType"
+ minOccurs="0" maxOccurs="unbounded" />
+ <xsd:element maxOccurs="1" minOccurs="0" name="vc-information"
+ type="tns:informationType" nillable="true" />
+ </xsd:sequence>
+ <xsd:attribute name="path" type="xsd:string" use="required" />
+ <xsd:attribute name="revision" type="tns:versionString" use="optional"/>
+ <xsd:attribute name="author" type="xsd:NMTOKEN" use="optional" />
+ <xsd:attribute name="action" use="optional">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:NMTOKEN">
+ <xsd:enumeration value="ADD" />
+ <xsd:enumeration value="DELETE" />
+ <xsd:enumeration value="RESTORE" />
+ <xsd:enumeration value="MOVE" />
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:attribute>
+ <xsd:attribute name="note" type="xsd:string" use="optional" />
+ </xsd:complexType>
+
+ <xsd:element id="file" name="file" nillable="true" type="tns:fileType">
+ <xsd:annotation>
+ <xsd:documentation>
+ A file element contains a single block representing a fileType.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:unique name="fileDescriptionLangConstraint">
+ <xsd:selector xpath="tns:description" />
+ <xsd:field xpath="@lang" />
+ </xsd:unique>
+ </xsd:element>
+
+ <xsd:complexType id="itemType" name="itemType">
+ <xsd:annotation>
+ <xsd:documentation>
+ These element blocks define a single change-item within the scope of a
+ given release. A change-item consists of one or more files that were
+ affected, and a description of the change itself.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:sequence>
+ <xsd:element maxOccurs="1" minOccurs="0" name="vc-information"
+ type="tns:informationType" nillable="true" />
+ <xsd:choice minOccurs="1" maxOccurs="1">
+ <xsd:element ref="tns:file" />
+ <xsd:element name="fileset" nillable="false">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element maxOccurs="1" minOccurs="0" name="vc-information"
+ type="tns:informationType" nillable="true" />
+ <xsd:element maxOccurs="unbounded" minOccurs="1" ref="tns:file" />
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+ </xsd:choice>
+ <xsd:element name="description" type="tns:descriptionType"
+ minOccurs="1" maxOccurs="unbounded" />
+ </xsd:sequence>
+ <xsd:attribute name="id" type="xsd:ID" />
+ </xsd:complexType>
+
+ <xsd:element id="item" name="item" nillable="false" type="tns:itemType">
+ <xsd:annotation>
+ <xsd:documentation>
+ An item element contains a single block representing an itemType.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:unique name="itemDescriptionLangConstraint">
+ <xsd:selector xpath="tns:description" />
+ <xsd:field xpath="@lang" />
+ </xsd:unique>
+ </xsd:element>
+
+ <xsd:complexType id="releaseType" name="releaseType">
+ <xsd:annotation>
+ <xsd:documentation>
+ The release is the primary piece of information that a changelog
+ collects and organizes. A release contains an optional description,
+ followed by one or more item blocks. The release element is also the
+ greatest user of attributes besides the file element. A release element
+ must have at least a "version" attribute, uniquely identifying the
+ release itself. Additionally, it may have "tag" to associate it with
+ a release-system tag and "date" to specify the date the release was
+ created.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:sequence>
+ <xsd:element name="description" type="tns:descriptionType"
+ minOccurs="0" maxOccurs="unbounded" />
+ <xsd:element maxOccurs="unbounded" minOccurs="0" name="information"
+ type="tns:informationType" nillable="true" />
+ <xsd:element maxOccurs="1" minOccurs="0" name="vc-information"
+ type="tns:informationType" nillable="true" />
+ <xsd:element maxOccurs="unbounded" minOccurs="1" ref="tns:item" />
+ </xsd:sequence>
+ <xsd:attribute name="version" type="xsd:token" use="required" />
+ <xsd:attribute name="tag" type="xsd:NMTOKEN" />
+ <xsd:attribute name="date" type="xsd:token" use="required" /> <!-- type="xsd:dateTime" -->
+ </xsd:complexType>
+
+ <xsd:element id="release" name="release" nillable="false"
+ type="tns:releaseType">
+ <xsd:annotation>
+ <xsd:documentation>
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:unique name="releaseDescriptionLangConstraint">
+ <xsd:selector xpath="tns:description" />
+ <xsd:field xpath="@lang" />
+ </xsd:unique>
+ </xsd:element>
+
+ <xsd:element id="changelog" name="changelog" nillable="false">
+ <xsd:annotation>
+ <xsd:documentation>
+ The changelog element is intended as the document root element. It
+ contains an overview element (identical in structure to the description
+ element, but named differently to prevent collision in XPath queries)
+ and one or more release blocks.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element maxOccurs="unbounded" minOccurs="1" name="description"
+ nillable="false" type="tns:descriptionType" />
+ <xsd:element maxOccurs="unbounded" minOccurs="0" name="information"
+ type="tns:informationType" nillable="true" />
+ <xsd:element maxOccurs="1" minOccurs="0" name="vc-information"
+ type="tns:informationType" nillable="true" />
+ <xsd:element maxOccurs="unbounded" minOccurs="1" ref="tns:release" />
+ </xsd:sequence>
+ </xsd:complexType>
+ <xsd:unique name="changelogDescriptionLangConstraint">
+ <xsd:selector xpath="tns:description" />
+ <xsd:field xpath="@lang" />
+ </xsd:unique>
+ </xsd:element>
+
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/choice_0.xml b/libxml2/test/schemas/choice_0.xml
new file mode 100644
index 0000000..677b039
--- /dev/null
+++ b/libxml2/test/schemas/choice_0.xml
@@ -0,0 +1,3 @@
+<doc>
+<a/>
+</doc>
diff --git a/libxml2/test/schemas/choice_0.xsd b/libxml2/test/schemas/choice_0.xsd
new file mode 100644
index 0000000..1491b6b
--- /dev/null
+++ b/libxml2/test/schemas/choice_0.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:element name="doc">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:choice minOccurs="1" maxOccurs="1">
+ <xs:element name="a"/>
+ <xs:element name="b"/>
+ </xs:choice>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/choice_1.xml b/libxml2/test/schemas/choice_1.xml
new file mode 100644
index 0000000..d5c0dd1
--- /dev/null
+++ b/libxml2/test/schemas/choice_1.xml
@@ -0,0 +1,3 @@
+<doc>
+<b/>
+</doc>
diff --git a/libxml2/test/schemas/choice_1.xsd b/libxml2/test/schemas/choice_1.xsd
new file mode 100644
index 0000000..00614d0
--- /dev/null
+++ b/libxml2/test/schemas/choice_1.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:element name="doc">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:choice minOccurs="0" maxOccurs="1">
+ <xs:element name="a"/>
+ <xs:element name="b"/>
+ </xs:choice>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/choice_2.xml b/libxml2/test/schemas/choice_2.xml
new file mode 100644
index 0000000..7b27f17
--- /dev/null
+++ b/libxml2/test/schemas/choice_2.xml
@@ -0,0 +1,4 @@
+<doc>
+<a/>
+<b/>
+</doc>
diff --git a/libxml2/test/schemas/choice_2.xsd b/libxml2/test/schemas/choice_2.xsd
new file mode 100644
index 0000000..9f2b094
--- /dev/null
+++ b/libxml2/test/schemas/choice_2.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:element name="doc">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:choice minOccurs="1" maxOccurs="3">
+ <xs:element name="a"/>
+ <xs:element name="b"/>
+ </xs:choice>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/choice_3.xml b/libxml2/test/schemas/choice_3.xml
new file mode 100644
index 0000000..0358109
--- /dev/null
+++ b/libxml2/test/schemas/choice_3.xml
@@ -0,0 +1,4 @@
+<doc>
+<a/>
+<a/>
+</doc>
diff --git a/libxml2/test/schemas/choice_4.xml b/libxml2/test/schemas/choice_4.xml
new file mode 100644
index 0000000..636923c
--- /dev/null
+++ b/libxml2/test/schemas/choice_4.xml
@@ -0,0 +1,2 @@
+<doc>
+</doc>
diff --git a/libxml2/test/schemas/choice_5.xml b/libxml2/test/schemas/choice_5.xml
new file mode 100644
index 0000000..3345a68
--- /dev/null
+++ b/libxml2/test/schemas/choice_5.xml
@@ -0,0 +1,6 @@
+<doc>
+<a/>
+<b/>
+<a/>
+</doc>
+
diff --git a/libxml2/test/schemas/choice_6.xml b/libxml2/test/schemas/choice_6.xml
new file mode 100644
index 0000000..394153d
--- /dev/null
+++ b/libxml2/test/schemas/choice_6.xml
@@ -0,0 +1,7 @@
+<doc>
+<a/>
+<b/>
+<a/>
+<a/>
+</doc>
+
diff --git a/libxml2/test/schemas/complex-type-extension_0.xml b/libxml2/test/schemas/complex-type-extension_0.xml
new file mode 100644
index 0000000..8cdda23
--- /dev/null
+++ b/libxml2/test/schemas/complex-type-extension_0.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<ItemsList xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
+ <Item xsi:type="ItemWithNumber">
+ <Name>Name1</Name>
+ <Number>20</Number>
+ </Item>
+ <Item xsi:type="ItemWithNumber">
+ <Name>Name1</Name>
+ <Name>Name2</Name>
+ <Number>20</Number>
+ </Item>
+</ItemsList>
diff --git a/libxml2/test/schemas/complex-type-extension_0.xsd b/libxml2/test/schemas/complex-type-extension_0.xsd
new file mode 100644
index 0000000..6a6237a
--- /dev/null
+++ b/libxml2/test/schemas/complex-type-extension_0.xsd
@@ -0,0 +1,27 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:complexType name="Item" abstract="true">
+ <xs:sequence minOccurs="1" maxOccurs="unbounded">
+ <xs:element name="Name" type="xs:string"/>
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:complexType name="ItemWithNumber">
+ <xs:complexContent>
+ <xs:extension base="Item">
+ <xs:sequence>
+ <xs:element name="Number" type="xs:nonNegativeInteger"/>
+ </xs:sequence>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+
+ <xs:element name="ItemsList">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="Item" type="Item" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/cos-ct-extends-1-3_0.xml b/libxml2/test/schemas/cos-ct-extends-1-3_0.xml
new file mode 100644
index 0000000..a0b8a59
--- /dev/null
+++ b/libxml2/test/schemas/cos-ct-extends-1-3_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!--
+-->
+<foo xmlns="http://FOO" xmlns:foo="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO cos-ct-extends-1-3_0.xsd">
+ <bar.A foo:bar="o"/>
+ <bar.B foo:bar="o"/>
+</foo>
diff --git a/libxml2/test/schemas/cos-ct-extends-1-3_0.xsd b/libxml2/test/schemas/cos-ct-extends-1-3_0.xsd
new file mode 100644
index 0000000..7655a8e
--- /dev/null
+++ b/libxml2/test/schemas/cos-ct-extends-1-3_0.xsd
@@ -0,0 +1,51 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!--
+ Schema Component Constraint: Derivation Valid (Extension)
+
+ 1.3 If it has an {attribute wildcard}, the complex type definition must
+ also have one, and the base type definition's {attribute wildcard}'s
+ {namespace constraint} must be a subset of the complex type definition's
+ {attribute wildcard}'s {namespace constraint}, as defined by Wildcard Subset (§3.10.6).
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO"
+ elementFormDefault="qualified">
+
+ <element name="foo">
+ <complexType>
+ <sequence>
+ <element name="bar.A" type="foo:type.A" />
+ <element name="bar.B" type="foo:type.B" />
+ </sequence>
+ </complexType>
+ </element>
+
+ <complexType name="type.A">
+ <complexContent>
+ <!-- This is OK, since the complete wildcard
+ is the wildcard of the base type. -->
+ <extension base="foo:base.type.A" />
+ </complexContent>
+ </complexType>
+
+ <complexType name="base.type.A">
+ <anyAttribute namespace="##any" processContents="skip" />
+ </complexType>
+
+ <complexType name="type.B">
+ <complexContent>
+ <extension base="foo:base.type.B">
+ <!-- This is OK, since the complete wildcard is a union
+ of "##any" and "http://FOO" = "##any". Thus the complete
+ wildcard is equal to that one in the base class. -->
+ <anyAttribute namespace="http://FOO" processContents="skip" />
+ </extension>
+ </complexContent>
+ </complexType>
+
+ <complexType name="base.type.B">
+ <anyAttribute namespace="##any" processContents="skip" />
+ </complexType>
+
+</schema>
diff --git a/libxml2/test/schemas/cos-st-restricts-1-2-err_0.xml b/libxml2/test/schemas/cos-st-restricts-1-2-err_0.xml
new file mode 100644
index 0000000..6f60e5b
--- /dev/null
+++ b/libxml2/test/schemas/cos-st-restricts-1-2-err_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0"?>
+<foo xmlns="http://FOO" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO cos-st-restricts-1-2-err_0.xsd">1 2</foo>
diff --git a/libxml2/test/schemas/cos-st-restricts-1-2-err_0.xsd b/libxml2/test/schemas/cos-st-restricts-1-2-err_0.xsd
new file mode 100644
index 0000000..9d3fabf
--- /dev/null
+++ b/libxml2/test/schemas/cos-st-restricts-1-2-err_0.xsd
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<schema xmlns="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO" xmlns:foo="http://FOO">
+
+ <element name="foo" type="foo:type.A"/>
+
+ <simpleType name="type.A">
+ <restriction>
+ <simpleType>
+ <list itemType="integer"/>
+ </simpleType>
+ <length value="3"/>
+ </restriction>
+ </simpleType>
+
+ <!--restriction base="foo:type.base.A">
+
+ </restriction-->
+
+ <simpleType name="type.base.A">
+ <restriction>
+ <simpleType>
+ <list itemType="integer"/>
+ </simpleType>
+ </restriction>
+ </simpleType>
+
+
+
+</schema>
diff --git a/libxml2/test/schemas/ct-sc-nobase_0.xml b/libxml2/test/schemas/ct-sc-nobase_0.xml
new file mode 100644
index 0000000..8678410
--- /dev/null
+++ b/libxml2/test/schemas/ct-sc-nobase_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO ct-sc-nobase_0.xsd"/> \ No newline at end of file
diff --git a/libxml2/test/schemas/ct-sc-nobase_0.xsd b/libxml2/test/schemas/ct-sc-nobase_0.xsd
new file mode 100644
index 0000000..a00e941
--- /dev/null
+++ b/libxml2/test/schemas/ct-sc-nobase_0.xsd
@@ -0,0 +1,24 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+
+ <xsd:complexType name="base">
+ <xsd:simpleContent>
+ <xsd:extension base="xsd:string"/>
+ </xsd:simpleContent>
+ </xsd:complexType>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:simpleContent>
+ <xsd:restriction base="foo:base">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:string"/>
+ </xsd:simpleType>
+ </xsd:restriction>
+ </xsd:simpleContent>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/date_0.xml b/libxml2/test/schemas/date_0.xml
new file mode 100644
index 0000000..6c677ed
--- /dev/null
+++ b/libxml2/test/schemas/date_0.xml
@@ -0,0 +1,26 @@
+<?xml version="1.0"?>
+<date>
+ <time>01:02:59</time>
+ <time1>01:02:59</time1>
+ <time2>12:59:59.0001</time2>
+ <time2>12:00:00</time2>
+ <date1>1996-05-20</date1>
+ <date1>2002-05-18</date1>
+ <date2>1996-05-19Z</date2>
+ <date2>2002-05-19Z</date2>
+ <date1>2002-05-18Z</date1>
+ <date1>2000-05-18Z</date1>
+ <dt1>2000-05-18T00:00:00</dt1>
+ <dt2>2002-05-19T21:30:00.99</dt2>
+ <dt1>1969-12-31T23:00:01-01:00</dt1>
+ <hol>--01-01</hol>
+ <hol>--07-04</hol>
+ <hol>--12-25</hol>
+ <year1>2002</year1>
+ <yearmon1>2002-05</yearmon1>
+ <mon1>--05Z</mon1>
+ <day1>---31</day1>
+ <monthday1>--02-28Z</monthday1>
+ <monthday1>--12-31-06:00</monthday1>
+ <dt2>2003-04-30T18:00:00-06:00</dt2>
+</date>
diff --git a/libxml2/test/schemas/date_0.xsd b/libxml2/test/schemas/date_0.xsd
new file mode 100644
index 0000000..7247394
--- /dev/null
+++ b/libxml2/test/schemas/date_0.xsd
@@ -0,0 +1,122 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:annotation>
+ <xsd:documentation xml:lang="en">
+ Testing date/time data types
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:element name="date">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:choice minOccurs="1" maxOccurs="unbounded">
+ <xsd:element name="time" type="xsd:time"/>
+ <xsd:element name="time1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:time">
+ <xsd:maxInclusive value="23:59:59.9999999"/>
+ <xsd:minInclusive value="00:00:00"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="time2">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:time">
+ <xsd:maxInclusive value="13:50:50"/>
+ <xsd:minInclusive value="12:00:00"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="date1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:date">
+ <xsd:maxExclusive value="2002-05-19"/>
+ <xsd:minExclusive value="1996-05-19"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="date2">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:date">
+ <xsd:maxInclusive value="2002-05-19Z"/>
+ <xsd:minInclusive value="1996-05-19Z"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="dt1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:dateTime">
+ <xsd:maxExclusive value="2002-01-01T00:00:00Z"/>
+ <xsd:minExclusive value="1970-01-01T00:00:00Z"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="dt2">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:dateTime">
+ <xsd:maxInclusive value="2003-05-01T00:00:00Z"/>
+ <xsd:minInclusive value="1996-05-19T21:30:00Z"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="hol" type="holidays"/>
+ <xsd:element name="year1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:gYear">
+ <xsd:maxInclusive value="2003Z"/>
+ <xsd:minInclusive value="1996Z"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="yearmon1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:gYearMonth">
+ <xsd:maxInclusive value="2003-05Z"/>
+ <xsd:minInclusive value="1996-05Z"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="mon1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:gMonth">
+ <xsd:minInclusive value="--01Z"/>
+ <xsd:maxInclusive value="--05Z"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="day1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:gDay">
+ <xsd:minInclusive value="---28"/>
+ <xsd:maxInclusive value="---31"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="monthday1" type="xsd:gMonthDay"/>
+ </xsd:choice>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+ <xsd:simpleType name='holidays'>
+ <xsd:annotation>
+ <xsd:documentation>some US holidays</xsd:documentation>
+ </xsd:annotation>
+ <xsd:restriction base='xsd:gMonthDay'>
+ <xsd:enumeration value='--01-01'>
+ <xsd:annotation>
+ <xsd:documentation>New Year's day</xsd:documentation>
+ </xsd:annotation>
+ </xsd:enumeration>
+ <xsd:enumeration value='--07-04'>
+ <xsd:annotation>
+ <xsd:documentation>4th of July</xsd:documentation>
+ </xsd:annotation>
+ </xsd:enumeration>
+ <xsd:enumeration value='--12-25'>
+ <xsd:annotation>
+ <xsd:documentation>Christmas</xsd:documentation>
+ </xsd:annotation>
+ </xsd:enumeration>
+ </xsd:restriction>
+ </xsd:simpleType>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/decimal-1.xml b/libxml2/test/schemas/decimal-1.xml
new file mode 100644
index 0000000..4568ff1
--- /dev/null
+++ b/libxml2/test/schemas/decimal-1.xml
@@ -0,0 +1,37 @@
+<?xml version="1.0"?>
+<!-- test the values:
+ - BAD
+ + BAD
+ 1.
+ .1
+ 0.
+ .0
+ - 1 BAD
+ + 1 BAD
+ . BAD
+ 000 !
+ -->
+<foo
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="decimal-1.xsd">
+ <!-- The good ones. -->
+ <val> 0. </val>
+ <val> .0 </val>
+ <val> .10 </val>
+ <val> 01. </val>
+ <val> 000 </val>
+ <val>123456789012345678</val>
+ <val>-123456789012345678</val>
+ <val>0.123456789012345678</val>
+ <val>-0.123456789012345678</val>
+ <!-- The bad ones. -->
+ <val>.</val>
+ <val>-</val>
+ <val>+</val>
+ <val>*</val>
+ <val>- 1</val>
+ <val>+ 1</val>
+ <val>+ 0</val>
+ <val>- 0</val>
+ <!--ref>0.0</ref-->
+</foo>
diff --git a/libxml2/test/schemas/decimal-1.xsd b/libxml2/test/schemas/decimal-1.xsd
new file mode 100644
index 0000000..830ca3e
--- /dev/null
+++ b/libxml2/test/schemas/decimal-1.xsd
@@ -0,0 +1,29 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+
+ <xsd:simpleType name="myDecimal">
+ <xsd:restriction base="xsd:decimal">
+ <xsd:totalDigits value="18"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="val" type="myDecimal" maxOccurs="unbounded"/>
+ <xsd:element name="ref" type="myDecimal" minOccurs="0"/>
+ </xsd:sequence>
+ </xsd:complexType>
+
+ <!--xsd:key name="myKey">
+ <xsd:selector xpath="val"/>
+ <xsd:field xpath="."/>
+ </xsd:key>
+
+ <xsd:keyref name="myKeyRef" refer="myKey">
+ <xsd:selector xpath="ref"/>
+ <xsd:field xpath="."/>
+ </xsd:keyref-->
+ </xsd:element>
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/decimal-1_0.xml b/libxml2/test/schemas/decimal-1_0.xml
new file mode 100644
index 0000000..7bf3719
--- /dev/null
+++ b/libxml2/test/schemas/decimal-1_0.xml
@@ -0,0 +1,24 @@
+<?xml version="1.0"?>
+<foo
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="decimal-1.xsd">
+ <!-- The good ones. -->
+ <val> 0. </val>
+ <val> .0 </val>
+ <val> .10 </val>
+ <val> 01. </val>
+ <val> 000 </val>
+ <val>123456789012345678</val>
+ <val>-123456789012345678</val>
+ <val>0.123456789012345678</val>
+ <val>-0.123456789012345678</val>
+ <!-- The bad ones. -->
+ <val>.</val>
+ <val>-</val>
+ <val>+</val>
+ <val>*</val>
+ <val>- 1</val>
+ <val>+ 1</val>
+ <val>+ 0</val>
+ <val>- 0</val>
+</foo>
diff --git a/libxml2/test/schemas/decimal-1_1.xsd b/libxml2/test/schemas/decimal-1_1.xsd
new file mode 100644
index 0000000..f598c86
--- /dev/null
+++ b/libxml2/test/schemas/decimal-1_1.xsd
@@ -0,0 +1,19 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+
+ <xsd:simpleType name="myDecimal">
+ <xsd:restriction base="xsd:decimal">
+ <xsd:totalDigits value="18"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="val" type="myDecimal" maxOccurs="unbounded"/>
+ </xsd:sequence>
+ </xsd:complexType>
+
+ </xsd:element>
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/decimal-2_0.xml b/libxml2/test/schemas/decimal-2_0.xml
new file mode 100644
index 0000000..166f781
--- /dev/null
+++ b/libxml2/test/schemas/decimal-2_0.xml
@@ -0,0 +1,14 @@
+<?xml version="1.0"?>
+<foo
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="decimal-2.xsd">
+ <!-- The good ones. -->
+ <val>0.1</val>
+ <val>0.001</val>
+ <val>0.0</val>
+ <val>-0.0</val>
+ <val>1</val>
+ <!-- The bad ones. -->
+ <val>-0.1</val>
+ <val>-1</val>
+</foo>
diff --git a/libxml2/test/schemas/decimal-2_1.xsd b/libxml2/test/schemas/decimal-2_1.xsd
new file mode 100644
index 0000000..cc71670
--- /dev/null
+++ b/libxml2/test/schemas/decimal-2_1.xsd
@@ -0,0 +1,18 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+
+ <xsd:simpleType name="myDecimal">
+ <xsd:restriction base="xsd:decimal">
+ <xsd:minInclusive value="0"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="val" type="myDecimal" maxOccurs="unbounded"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/decimal-3_0.xml b/libxml2/test/schemas/decimal-3_0.xml
new file mode 100644
index 0000000..fec1ed3
--- /dev/null
+++ b/libxml2/test/schemas/decimal-3_0.xml
@@ -0,0 +1,17 @@
+<?xml version="1.0"?>
+<foo
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="decimal-3.xsd">
+ <!-- The good ones. -->
+ <val>0.12</val>
+ <val>0.0</val>
+ <val>0.02</val>
+ <val>12</val>
+ <val>1.2</val>
+ <!-- The bad ones. -->
+ <val>0.123</val>
+ <val>0.023</val>
+ <val>123</val>
+ <val>12.3</val>
+</foo>
+
diff --git a/libxml2/test/schemas/decimal-3_1.xsd b/libxml2/test/schemas/decimal-3_1.xsd
new file mode 100644
index 0000000..23ae8f7
--- /dev/null
+++ b/libxml2/test/schemas/decimal-3_1.xsd
@@ -0,0 +1,18 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+
+ <xsd:simpleType name="myDecimal">
+ <xsd:restriction base="xsd:decimal">
+ <xsd:totalDigits value="2"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="val" type="myDecimal" maxOccurs="unbounded"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/derivation-ok-extension-err_0.xml b/libxml2/test/schemas/derivation-ok-extension-err_0.xml
new file mode 100644
index 0000000..ccfa348
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-extension-err_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO derivation-ok-extension-err_0.xsd"
+ barA_1="o" barA_2="o"/>
+
+
+
+
diff --git a/libxml2/test/schemas/derivation-ok-extension-err_0.xsd b/libxml2/test/schemas/derivation-ok-extension-err_0.xsd
new file mode 100644
index 0000000..89be581
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-extension-err_0.xsd
@@ -0,0 +1,22 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://FOO" targetNamespace="http://FOO">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:extension base="typeA">
+ <xs:attribute name="barA_1" type="xs:string" use="optional"/>
+ <xs:attribute name="barA_2" type="xs:string" use="required"/>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:complexType name="typeA">
+ <xs:attribute name="barA_1" type="xs:string" use="required"/>
+ </xs:complexType>
+
+</xs:schema>
+
+
diff --git a/libxml2/test/schemas/derivation-ok-extension_0.xml b/libxml2/test/schemas/derivation-ok-extension_0.xml
new file mode 100644
index 0000000..0cf871e
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-extension_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO derivation-ok-extension_0.xsd"
+ barA_1="o" barA_2="o"/>
+
+
+
+
diff --git a/libxml2/test/schemas/derivation-ok-extension_0.xsd b/libxml2/test/schemas/derivation-ok-extension_0.xsd
new file mode 100644
index 0000000..b99065b
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-extension_0.xsd
@@ -0,0 +1,22 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://FOO" targetNamespace="http://FOO">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:extension base="typeA">
+ <xs:attribute name="barA_2" type="xs:string" use="required"/>
+ <xs:attribute name="barA_1" type="xs:string" use="prohibited"/>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:complexType name="typeA">
+ <xs:attribute name="barA_1" type="xs:string" use="required"/>
+ </xs:complexType>
+
+</xs:schema>
+
+
diff --git a/libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xml b/libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xml
new file mode 100644
index 0000000..a92fb0c
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO derivation-ok-restriction-2-1-1_0.xsd"/>
+
+
+
+
diff --git a/libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xsd b/libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xsd
new file mode 100644
index 0000000..e91fe43
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-restriction-2-1-1_0.xsd
@@ -0,0 +1,56 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://FOO" targetNamespace="http://FOO">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="typeA">
+ <xs:attribute name="barA_1" type="xs:string" use="optional"/>
+ <!-- OK -->
+ <xs:attribute name="barA_2" type="xs:string" use="required"/>
+ <!-- OK -->
+ <xs:attribute name="barA_3" type="xs:string" use="prohibited"/>
+ <!-- OK -->
+
+ <xs:attribute name="barB_1" type="xs:string" use="optional"/>
+ <!-- 2.1.1 inconsistent ( OR 3 ) -->
+ <xs:attribute name="barB_2" type="xs:string" use="required"/>
+ <!-- OK -->
+ <xs:attribute name="barB_3" type="xs:string" use="prohibited"/>
+ <!-- 3 -->
+
+ <xs:attribute name="barC_1" type="xs:string" use="optional"/>
+ <!-- 2.2 no match in base -->
+ <xs:attribute name="barC_2" type="xs:string" use="required"/>
+ <!-- 2.2 no match in base -->
+ <xs:attribute name="barC_3" type="xs:string" use="prohibited"/>
+ <!-- OK -->
+
+ <xs:attribute name="barD_1" type="xs:string" use="optional"/>
+ <!-- 2.2 no match in base -->
+ <xs:attribute name="barD_2" type="xs:string" use="required"/>
+ <!-- 2.2 no match in base -->
+ <xs:attribute name="barD_3" type="xs:string" use="prohibited"/>
+ <!-- OK -->
+
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:complexType name="typeA">
+ <xs:attribute name="barA_1" type="xs:string" use="optional"/>
+ <xs:attribute name="barA_2" type="xs:string" use="optional"/>
+ <xs:attribute name="barA_3" type="xs:string" use="optional"/>
+ <xs:attribute name="barB_1" type="xs:string" use="required"/>
+ <xs:attribute name="barB_2" type="xs:string" use="required"/>
+ <xs:attribute name="barB_3" type="xs:string" use="required"/>
+ <xs:attribute name="barC_1" type="xs:string" use="prohibited"/>
+ <xs:attribute name="barC_2" type="xs:string" use="prohibited"/>
+ <xs:attribute name="barC_3" type="xs:string" use="prohibited"/>
+ </xs:complexType>
+
+</xs:schema>
+
+
diff --git a/libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xml b/libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xml
new file mode 100644
index 0000000..6021eb9
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo xmlns="http://FOO" xmlns:foo="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO derivation-ok-restriction-4-1-err_0.xsd">
+ <bar.A />
+ <bar.B />
+ <bar.C />
+</foo>
diff --git a/libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xsd b/libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xsd
new file mode 100644
index 0000000..c7400ac
--- /dev/null
+++ b/libxml2/test/schemas/derivation-ok-restriction-4-1-err_0.xsd
@@ -0,0 +1,69 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!--
+ Schema Component Constraint: Derivation Valid (Restriction, Complex)
+
+ 4 If there is an {attribute wildcard}, all of the following must be true:
+
+ 4.1 The {base type definition} must also have one.
+
+ 4.2 The complex type definition's {attribute wildcard}'s {namespace constraint}
+ must be a subset of the {base type definition}'s {attribute wildcard}'s {namespace
+ constraint}, as defined by Wildcard Subset (§3.10.6).
+
+ 4.3 Unless the {base type definition} is the ·ur-type definition·, the complex type
+ definition's {attribute wildcard}'s {process contents} must be identical to or stronger
+ than the {base type definition}'s {attribute wildcard}'s {process contents},
+ where strict is stronger than lax is stronger than skip.
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO"
+ >
+
+ <element name="foo">
+ <complexType>
+ <sequence>
+ <element name="bar.A" type="foo:type.A" />
+ <element name="bar.B" type="foo:type.B" />
+ <element name="bar.C" type="foo:type.C" />
+ </sequence>
+ </complexType>
+ </element>
+
+ <complexType name="type.A">
+ <complexContent>
+ <restriction base="foo:base.type.A">
+ <anyAttribute namespace="##any" processContents="skip" />
+ </restriction>
+ </complexContent>
+ </complexType>
+
+ <complexType name="base.type.A">
+ <attribute name="bar" type="string"/>
+ </complexType>
+
+ <complexType name="type.B">
+ <complexContent>
+ <restriction base="foo:base.type.B">
+ <anyAttribute namespace="##any" processContents="skip" />
+ </restriction>
+ </complexContent>
+ </complexType>
+
+ <complexType name="base.type.B">
+ <anyAttribute namespace="http://FOO" processContents="skip" />
+ </complexType>
+
+ <complexType name="type.C">
+ <complexContent>
+ <restriction base="foo:base.type.C">
+ <anyAttribute namespace="##any" processContents="skip" />
+ </restriction>
+ </complexContent>
+ </complexType>
+
+ <complexType name="base.type.C">
+ <anyAttribute namespace="##any" processContents="lax" />
+ </complexType>
+
+</schema>
diff --git a/libxml2/test/schemas/derivation-restriction-anyAttr_0.xml b/libxml2/test/schemas/derivation-restriction-anyAttr_0.xml
new file mode 100644
index 0000000..66e7d3f
--- /dev/null
+++ b/libxml2/test/schemas/derivation-restriction-anyAttr_0.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo
+ xmlns:f="http://FOO" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xmlns:bar="http://BAR"
+ xsi:noNamespaceSchemaLocation="file:///c:/dev/libxml2/patches/2004-05-17/derivation-restriction-anyAttr_0.xsd"
+ >
+ <bar barA="ooo" />
+</foo>
+
+
+
+
diff --git a/libxml2/test/schemas/derivation-restriction-anyAttr_0.xsd b/libxml2/test/schemas/derivation-restriction-anyAttr_0.xsd
new file mode 100644
index 0000000..f72c316
--- /dev/null
+++ b/libxml2/test/schemas/derivation-restriction-anyAttr_0.xsd
@@ -0,0 +1,24 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="unqualified">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="bar" type="typeA"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:attributeGroup name="attrGrA">
+ <xs:anyAttribute namespace="##targetNamespace"/>
+ </xs:attributeGroup>
+
+ <xs:complexType name="typeA">
+ <xs:attributeGroup ref="attrGrA" />
+ <xs:anyAttribute namespace="##targetNamespace" processContents="lax"/>
+ </xs:complexType>
+
+</xs:schema>
+
+
diff --git a/libxml2/test/schemas/derivation-restriction-anyType.xml b/libxml2/test/schemas/derivation-restriction-anyType.xml
new file mode 100644
index 0000000..c86c50a
--- /dev/null
+++ b/libxml2/test/schemas/derivation-restriction-anyType.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO file:///c:/dev/libxml2/patches/2004-05-17/derivation-restriction-anyType.xsd"
+ barA_2="xxx"/>
+
+
+
+
diff --git a/libxml2/test/schemas/derivation-restriction-anyType.xsd b/libxml2/test/schemas/derivation-restriction-anyType.xsd
new file mode 100644
index 0000000..ec217d2
--- /dev/null
+++ b/libxml2/test/schemas/derivation-restriction-anyType.xsd
@@ -0,0 +1,22 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://FOO" targetNamespace="http://FOO">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:extension base="xs:anyType">
+ <xs:attribute name="barA_1" type="xs:string" use="optional"/>
+ <!-- OK -->
+ <xs:attribute name="barA_2" type="xs:string" use="required"/>
+ <!-- OK -->
+ <xs:attribute name="barA_3" type="xs:string" use="prohibited"/>
+ <!-- OK -->
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
+
+
diff --git a/libxml2/test/schemas/deter0_0.xml b/libxml2/test/schemas/deter0_0.xml
new file mode 100644
index 0000000..0ea1a41
--- /dev/null
+++ b/libxml2/test/schemas/deter0_0.xml
@@ -0,0 +1,5 @@
+<book>
+ <odd-page>first page</odd-page>
+ <even-page>second page</even-page>
+ <odd-page>third page</odd-page>
+</book>
diff --git a/libxml2/test/schemas/deter0_0.xsd b/libxml2/test/schemas/deter0_0.xsd
new file mode 100644
index 0000000..8b5da69
--- /dev/null
+++ b/libxml2/test/schemas/deter0_0.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0" encoding="utf-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:element name="odd-page" type="xs:string"/>
+ <xs:element name="even-page" type="xs:string"/>
+ <xs:element name="book">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:sequence minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="odd-page"/>
+ <xs:element ref="even-page"/>
+ </xs:sequence>
+ <xs:element ref="odd-page" minOccurs="0"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/dur_0.xml b/libxml2/test/schemas/dur_0.xml
new file mode 100644
index 0000000..be84943
--- /dev/null
+++ b/libxml2/test/schemas/dur_0.xml
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<duration>
+ <second1>PT0.9S</second1>
+ <second2>PT0.1S</second2>
+ <second2>PT0.999999S</second2>
+ <month1>P0Y27D</month1>
+ <month1>P27DT23H59M59S</month1>
+ <month2>P0Y</month2>
+ <year1>P367DT23H59M59S</year1>
+ <year1>P13M</year1>
+ <year2>P12M</year2>
+ <month3>PT86399S</month3>
+</duration>
diff --git a/libxml2/test/schemas/dur_0.xsd b/libxml2/test/schemas/dur_0.xsd
new file mode 100644
index 0000000..374c038
--- /dev/null
+++ b/libxml2/test/schemas/dur_0.xsd
@@ -0,0 +1,72 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:annotation>
+ <xsd:documentation xml:lang="en">
+ Testing duration data types
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:element name="duration">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:choice minOccurs="1" maxOccurs="unbounded">
+ <xsd:element name="second1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:duration">
+ <xsd:maxExclusive value="PT1S"/>
+ <xsd:minExclusive value="PT0.1S"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="second2">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:duration">
+ <xsd:maxInclusive value="PT1S"/>
+ <xsd:minInclusive value="PT0.1S"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="month1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:duration">
+ <xsd:maxExclusive value="P1M"/>
+ <xsd:minExclusive value="P0M"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="month2">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:duration">
+ <xsd:maxInclusive value="P1M"/>
+ <xsd:minInclusive value="P0M"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="month3" type="MSD"/>
+ <xsd:element name="year1">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:duration">
+ <xsd:maxExclusive value="P2Y"/>
+ <xsd:minExclusive value="P1Y"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="year2">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:duration">
+ <xsd:maxInclusive value="P2Y"/>
+ <xsd:minInclusive value="P1Y"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ </xsd:choice>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+ <xsd:simpleType name="MSD">
+ <xsd:restriction base="xsd:duration">
+ <xsd:maxExclusive value="PT24H"/>
+ <xsd:minExclusive value="-PT24H"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/elem0_0.xml b/libxml2/test/schemas/elem0_0.xml
new file mode 100644
index 0000000..f741c58
--- /dev/null
+++ b/libxml2/test/schemas/elem0_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0"?>
+<doc/>
+
diff --git a/libxml2/test/schemas/elem0_0.xsd b/libxml2/test/schemas/elem0_0.xsd
new file mode 100644
index 0000000..2c5bf5f
--- /dev/null
+++ b/libxml2/test/schemas/elem0_0.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:annotation>
+ <xsd:documentation>
+ Testing min and max occurance attributes on element
+ </xsd:documentation>
+ </xsd:annotation>
+
+ <xsd:element name="doc">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name='a' minOccurs='0' maxOccurs='3'/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/element-err_0.xml b/libxml2/test/schemas/element-err_0.xml
new file mode 100644
index 0000000..4f43fd9
--- /dev/null
+++ b/libxml2/test/schemas/element-err_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO element-err_0.xsd"/> \ No newline at end of file
diff --git a/libxml2/test/schemas/element-err_0.xsd b/libxml2/test/schemas/element-err_0.xsd
new file mode 100644
index 0000000..92604c8
--- /dev/null
+++ b/libxml2/test/schemas/element-err_0.xsd
@@ -0,0 +1,39 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:goo="http://GOO">
+
+ <xsd:element name="bar" type="xsd:string"/>
+ <xsd:element type="xsd:string"/>
+ <xsd:element name="foo"
+ ref="foo:bar" minOccurs="3" maxOccurs="2"
+ abstract="true" block="flute"
+ form="qualified" id="b12" nillable="true"
+ substitutionGroup="foo:bar"
+ default="Jimi" fixed="Hendrix" final="fantasy">
+
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="foo:bar" name="myomy" minOccurs="3"
+ maxOccurs="2" abstract="true" block="flute"
+ form="qualified" id="b13" nillable="true"
+ substitutionGroup="foo:bar" type="xsd:string"
+ default="Jimi" fixed="Hendrix" final="fantasy">
+ <xsd:complexType/>
+ <xsd:simpleType/>
+ </xsd:element>
+ <xsd:element name="myomy" maxOccurs="0"
+ abstract="true" block="flute"
+ form="qualified" id="b14" nillable="true"
+ substitutionGroup="foo:bar" type="xsd:string"
+ default="Jimi" fixed="Hendrix" final="fantasy">
+ <xsd:complexType/>
+ <xsd:simpleType/>
+ </xsd:element>
+ </xsd:sequence>
+ </xsd:complexType>
+
+ </xsd:element>
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/element-minmax-err_0.xml b/libxml2/test/schemas/element-minmax-err_0.xml
new file mode 100644
index 0000000..62c5ec1
--- /dev/null
+++ b/libxml2/test/schemas/element-minmax-err_0.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<foo xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="element-minmax-err_0.xsd">
+ <bar/>
+</foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/element-minmax-err_0.xsd b/libxml2/test/schemas/element-minmax-err_0.xsd
new file mode 100644
index 0000000..3384e7c
--- /dev/null
+++ b/libxml2/test/schemas/element-minmax-err_0.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="bar" minOccurs="1" maxOccurs="0"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/empty-value_0.xml b/libxml2/test/schemas/empty-value_0.xml
new file mode 100644
index 0000000..e7058e2
--- /dev/null
+++ b/libxml2/test/schemas/empty-value_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<element1/>
diff --git a/libxml2/test/schemas/empty-value_1.xml b/libxml2/test/schemas/empty-value_1.xml
new file mode 100644
index 0000000..674ba86
--- /dev/null
+++ b/libxml2/test/schemas/empty-value_1.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<element2 att="test"/>
diff --git a/libxml2/test/schemas/empty-value_1.xsd b/libxml2/test/schemas/empty-value_1.xsd
new file mode 100644
index 0000000..5e17d5f
--- /dev/null
+++ b/libxml2/test/schemas/empty-value_1.xsd
@@ -0,0 +1,24 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified">
+ <xs:simpleType name="myDouble">
+ <xs:union memberTypes="xs:double">
+ <xs:simpleType>
+ <xs:restriction base="xs:string">
+ <xs:pattern value="\s*(N/A)?\s*"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:union>
+ </xs:simpleType>
+ <xs:element name="element1" type="myDouble"/>
+ <xs:element name="element2">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="myDouble">
+ <xs:attribute name="att" type="xs:string"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/empty_0.xml b/libxml2/test/schemas/empty_0.xml
new file mode 100644
index 0000000..e9906b7
--- /dev/null
+++ b/libxml2/test/schemas/empty_0.xml
@@ -0,0 +1 @@
+<internationalPrice currency="EUR" value="423.46"/>
diff --git a/libxml2/test/schemas/empty_0.xsd b/libxml2/test/schemas/empty_0.xsd
new file mode 100644
index 0000000..76e5f45
--- /dev/null
+++ b/libxml2/test/schemas/empty_0.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="internationalPrice">
+ <xsd:complexType>
+ <xsd:complexContent>
+ <xsd:restriction base="xsd:anyType">
+ <xsd:attribute name="currency" type="xsd:string"/>
+ <xsd:attribute name="value" type="xsd:decimal"/>
+ </xsd:restriction>
+ </xsd:complexContent>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/empty_1.xsd b/libxml2/test/schemas/empty_1.xsd
new file mode 100644
index 0000000..2c81c09
--- /dev/null
+++ b/libxml2/test/schemas/empty_1.xsd
@@ -0,0 +1,9 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="internationalPrice">
+ <xsd:complexType>
+ <xsd:attribute name="currency" type="xsd:string"/>
+ <xsd:attribute name="value" type="xsd:decimal"/>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/extension0_0.xml b/libxml2/test/schemas/extension0_0.xml
new file mode 100644
index 0000000..60dd348
--- /dev/null
+++ b/libxml2/test/schemas/extension0_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<addressee>
+ <forename>Albert</forename>
+ <forename>Arnold</forename>
+ <surname>Gore</surname>
+ <generation>Jr</generation>
+</addressee>
diff --git a/libxml2/test/schemas/extension0_0.xsd b/libxml2/test/schemas/extension0_0.xsd
new file mode 100644
index 0000000..d89751a
--- /dev/null
+++ b/libxml2/test/schemas/extension0_0.xsd
@@ -0,0 +1,20 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:complexType name="personName">
+ <xs:sequence>
+ <xs:element name="title" minOccurs="0"/>
+ <xs:element name="forename" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element name="surname"/>
+ </xs:sequence>
+ </xs:complexType>
+ <xs:complexType name="extendedName">
+ <xs:complexContent>
+ <xs:extension base="personName">
+ <xs:sequence>
+ <xs:element name="generation" minOccurs="0"/>
+ </xs:sequence>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+ <xs:element name="addressee" type="extendedName"/>
+</xs:schema>
diff --git a/libxml2/test/schemas/extension1_0.xml b/libxml2/test/schemas/extension1_0.xml
new file mode 100644
index 0000000..5c3a0c9
--- /dev/null
+++ b/libxml2/test/schemas/extension1_0.xml
@@ -0,0 +1 @@
+<title lang="fr">salut</title>
diff --git a/libxml2/test/schemas/extension1_0.xsd b/libxml2/test/schemas/extension1_0.xsd
new file mode 100644
index 0000000..0a11e14
--- /dev/null
+++ b/libxml2/test/schemas/extension1_0.xsd
@@ -0,0 +1,17 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:simpleType name="string255">
+ <xs:restriction base="xs:token">
+ <xs:maxLength value="255"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:element name="title">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="string255">
+ <xs:attribute name="lang" type="xs:language"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/extension1_1.xml b/libxml2/test/schemas/extension1_1.xml
new file mode 100644
index 0000000..7780cf6
--- /dev/null
+++ b/libxml2/test/schemas/extension1_1.xml
@@ -0,0 +1 @@
+<title langue="fr">salut</title>
diff --git a/libxml2/test/schemas/extension1_2.xml b/libxml2/test/schemas/extension1_2.xml
new file mode 100644
index 0000000..3d65bb0
--- /dev/null
+++ b/libxml2/test/schemas/extension1_2.xml
@@ -0,0 +1 @@
+<title lang="fr"><salut/></title>
diff --git a/libxml2/test/schemas/extension2_0.xml b/libxml2/test/schemas/extension2_0.xml
new file mode 100644
index 0000000..202c988
--- /dev/null
+++ b/libxml2/test/schemas/extension2_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<foo xmlns="http://myns"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://myns extension2_1.xsd"/>
diff --git a/libxml2/test/schemas/extension2_1.xsd b/libxml2/test/schemas/extension2_1.xsd
new file mode 100644
index 0000000..0fa88af
--- /dev/null
+++ b/libxml2/test/schemas/extension2_1.xsd
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="UTF-8"?>
+ <xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://myns"
+ targetNamespace="http://myns"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified"
+ xml:lang="en">
+
+ <xs:complexType name="dataInlineType">
+ <xs:complexContent>
+ <xs:extension base="xs:anyType"/>
+ </xs:complexContent>
+ </xs:complexType>
+
+ <xs:element name="foo" type="dataInlineType"/>
+
+ </xs:schema>
diff --git a/libxml2/test/schemas/facet-unionST-err1_0.xml b/libxml2/test/schemas/facet-unionST-err1_0.xml
new file mode 100644
index 0000000..b47df61
--- /dev/null
+++ b/libxml2/test/schemas/facet-unionST-err1_0.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0"?>
+<foo xmlns="http://FOO" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO facet-unionST-err1_0.xsd">tiny</foo>
+
diff --git a/libxml2/test/schemas/facet-unionST-err1_0.xsd b/libxml2/test/schemas/facet-unionST-err1_0.xsd
new file mode 100644
index 0000000..476668b
--- /dev/null
+++ b/libxml2/test/schemas/facet-unionST-err1_0.xsd
@@ -0,0 +1,27 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO" xmlns:foo="http://FOO">
+
+ <xsd:element name="foo" type="foo:fooType.B"/>
+
+ <xsd:simpleType name="fooType.B">
+ <xsd:restriction base="foo:fooType.A">
+ <xsd:enumeration value="medium"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:simpleType name="fooType.A">
+ <xsd:union>
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:NMTOKEN">
+ <xsd:enumeration value="small"/>
+ <xsd:enumeration value="medium"/>
+ <xsd:enumeration value="large"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:union>
+ </xsd:simpleType>
+
+
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/facet-whiteSpace_0.xml b/libxml2/test/schemas/facet-whiteSpace_0.xml
new file mode 100644
index 0000000..dba26ca
--- /dev/null
+++ b/libxml2/test/schemas/facet-whiteSpace_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<foo xmlns="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO facet-whiteSpace_0.xsd">hmmm
+
+ f f ff f
+ </foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/facet-whiteSpace_0.xsd b/libxml2/test/schemas/facet-whiteSpace_0.xsd
new file mode 100644
index 0000000..83ef142
--- /dev/null
+++ b/libxml2/test/schemas/facet-whiteSpace_0.xsd
@@ -0,0 +1,12 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO" xmlns="http://FOO">
+
+ <xsd:element name="foo">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:string">
+ <xsd:whiteSpace value="replace"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/group0_0.xml b/libxml2/test/schemas/group0_0.xml
new file mode 100644
index 0000000..bf58ba6
--- /dev/null
+++ b/libxml2/test/schemas/group0_0.xml
@@ -0,0 +1,3 @@
+<author>
+ <name>Foo Bar</name>
+</author>
diff --git a/libxml2/test/schemas/group0_0.xsd b/libxml2/test/schemas/group0_0.xsd
new file mode 100644
index 0000000..7dfa393
--- /dev/null
+++ b/libxml2/test/schemas/group0_0.xsd
@@ -0,0 +1,18 @@
+<?xml version="1.0" encoding="utf-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:group name="name">
+ <xs:choice>
+ <xs:element name="name" type="xs:string"/>
+ <xs:sequence>
+ <xs:element name="first-name" type="xs:string"/>
+ <xs:element name="middle-name" type="xs:string" minOccurs="0"/>
+ <xs:element name="last-name" type="xs:string"/>
+ </xs:sequence>
+ </xs:choice>
+ </xs:group>
+ <xs:element name="author">
+ <xs:complexType>
+ <xs:group ref="name"/>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/hexbinary_0.xml b/libxml2/test/schemas/hexbinary_0.xml
new file mode 100644
index 0000000..9513445
--- /dev/null
+++ b/libxml2/test/schemas/hexbinary_0.xml
@@ -0,0 +1,20 @@
+<?xml version="1.0"?>
+<xsd_hexBinary>
+ <hex>00</hex>
+ <hex>0123456789ABCDEF</hex>
+ <hex>abcdef0123456789</hex>
+ <hex>0123456789abcdef</hex>
+ <hex>0123456789ABCDEF</hex>
+ <hex>0123456789abcdef0123456789ABCDEF</hex>
+ <hex>0123456789abcdef0123456789ABCDEF0123456789abcdef0123456789ABCDEF0123456789abcdef0123456789ABCDEF0123456789abcdef0123456789ABCDEF0123456789abcdef0123456789ABCDEF</hex>
+ <hex>01234567899876543210</hex>
+ <hex>00112233445566778899aAbBcCdDeEfF</hex>
+ <hex>A0B1C2D3E4F5</hex>
+ <!-- minLength and maxLength -->
+ <hex2>00</hex2>
+ <hex2>0000000000000000</hex2>
+ <hex2>1122334455667788</hex2>
+ <!-- length -->
+ <hex3>abcd</hex3>
+ <hex3>0ed0</hex3>
+</xsd_hexBinary>
diff --git a/libxml2/test/schemas/hexbinary_0.xsd b/libxml2/test/schemas/hexbinary_0.xsd
new file mode 100644
index 0000000..60a6bec
--- /dev/null
+++ b/libxml2/test/schemas/hexbinary_0.xsd
@@ -0,0 +1,35 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="unqualified"
+ attributeFormDefault="unqualified">
+ <xsd:annotation>
+ <xsd:documentation xml:lang="en">
+ Testing hexBinary data types
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:element name="xsd_hexBinary">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:choice minOccurs="1" maxOccurs="unbounded">
+ <xsd:element name="hex" type="xsd:hexBinary"/>
+ <xsd:element name="hex2">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:hexBinary">
+ <xsd:maxLength value="8"/>
+ <xsd:minLength value="1"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="hex3">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:hexBinary">
+ <xsd:length value="2"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ </xsd:choice>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/hexbinary_1.xml b/libxml2/test/schemas/hexbinary_1.xml
new file mode 100644
index 0000000..0f34854
--- /dev/null
+++ b/libxml2/test/schemas/hexbinary_1.xml
@@ -0,0 +1,15 @@
+<?xml version="1.0"?>
+<!-- all (except 2 first) should fail to validate -->
+<xsd_hexBinary>
+ <hex></hex>
+ <hex/>
+ <hex>0</hex>
+ <hex>0123456789ABCDEFGH</hex>
+ <hex>+abcdef0123456789</hex>
+ <hex>-0123456789abcdef</hex>
+ <!-- minLength and maxLength -->
+ <hex2>112233445566778899</hex2>
+ <!-- length -->
+ <hex3>ab</hex3>
+ <hex3>00fedc</hex3>
+</xsd_hexBinary>
diff --git a/libxml2/test/schemas/idc-keyref-err1_0.xml b/libxml2/test/schemas/idc-keyref-err1_0.xml
new file mode 100644
index 0000000..64a1d0b
--- /dev/null
+++ b/libxml2/test/schemas/idc-keyref-err1_0.xml
@@ -0,0 +1,14 @@
+<?xml version="1.0"?>
+<Foo
+ xmlns="urn:test:foo"
+ xmlns:foo="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo idc-keyref_1.xsd">
+
+ <Def>
+ <Link foo:linkKey="L4"/>
+ </Def>
+
+ <Ref foo:linkRef="L4"/>
+
+</Foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/idc-keyref-err1_1.xsd b/libxml2/test/schemas/idc-keyref-err1_1.xsd
new file mode 100644
index 0000000..43c769f
--- /dev/null
+++ b/libxml2/test/schemas/idc-keyref-err1_1.xsd
@@ -0,0 +1,53 @@
+<?xml version="1.0"?>
+<xs:schema
+ targetNamespace="urn:test:foo"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:foo="urn:test:foo"
+ elementFormDefault="qualified"
+ attributeFormDefault="qualified">
+
+ <xs:element name="Link">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="xs:string">
+ <xs:attribute name="linkKey" type="xs:string" use="required"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+
+
+ <!-- -->
+ <xs:element name="Foo">
+ <xs:complexType>
+ <xs:sequence>
+
+ <xs:element name="Def">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="foo:Link"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="Ref">
+ <xs:complexType>
+ <xs:attribute name="linkRef" use="required"/>
+ </xs:complexType>
+ </xs:element>
+
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:key name="LinkKey">
+ <xs:selector xpath=".//foo:Link | .//foo:Link"/>
+ <xs:field xpath="@foo:linkKey"/>
+ </xs:key>
+
+ <xs:keyref name="LinkKeyRef" refer="foo:LinkKey">
+ <xs:selector xpath=".//foo:Ref"/>
+ <xs:field xpath="@foo:linkRef"/>
+ </xs:keyref>
+ </xs:element>
+
+</xs:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/import-455953.xsd b/libxml2/test/schemas/import-455953.xsd
new file mode 100644
index 0000000..4613d8f
--- /dev/null
+++ b/libxml2/test/schemas/import-455953.xsd
@@ -0,0 +1,24 @@
+<?xml version='1.0' encoding='UTF-8'?>
+<xs:schema targetNamespace="http://www.tempuri.org/ImportedSchema" elementFormDefault="qualified" xmlns:tns="http://www.tempuri.org/ImportedSchema" xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:complexType name="AnotherType">
+ <xs:sequence>
+ <xs:element name="B">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="MyB" type="xs:string" />
+ </xs:sequence>
+ <xs:attribute name="BID" type="xs:int"/>
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:element name="AnotherElement" type="tns:AnotherType">
+ <xs:key name="AnotherKey">
+ <xs:selector xpath="tns:B"/>
+ <xs:field xpath="@BID"/>
+ </xs:key>
+ </xs:element>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/import-bad-1_0.imp b/libxml2/test/schemas/import-bad-1_0.imp
new file mode 100755
index 0000000..d70c012
--- /dev/null
+++ b/libxml2/test/schemas/import-bad-1_0.imp
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<xsd:lalala
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://BAR">
+</xsd:lalala> \ No newline at end of file
diff --git a/libxml2/test/schemas/import0_0.imp b/libxml2/test/schemas/import0_0.imp
new file mode 100644
index 0000000..ce446d8
--- /dev/null
+++ b/libxml2/test/schemas/import0_0.imp
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema targetNamespace="http://example.net/xmlschema2"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns="http://example.net/xmlschema2"
+ elementFormDefault="qualified" attributeFormDefault="unqualified">
+
+<xs:simpleType name="tfoo">
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:maxLength value="2"/>
+ </xs:restriction>
+</xs:simpleType>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/import0_0.xml b/libxml2/test/schemas/import0_0.xml
new file mode 100644
index 0000000..5ba7e3f
--- /dev/null
+++ b/libxml2/test/schemas/import0_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<bar xmlns="http://example.net/xmlschema"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://example.net/xmlschema testImportTypes.xsd">
+ <foo1>
+ xy
+ </foo1>
+</bar>
diff --git a/libxml2/test/schemas/import0_0.xsd b/libxml2/test/schemas/import0_0.xsd
new file mode 100644
index 0000000..e973d64
--- /dev/null
+++ b/libxml2/test/schemas/import0_0.xsd
@@ -0,0 +1,21 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema targetNamespace="http://example.net/xmlschema"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:ns1="http://example.net/xmlschema"
+ xmlns:ns2="http://example.net/xmlschema2"
+ xmlns="http://example.net/xmlschema"
+ elementFormDefault="qualified" attributeFormDefault="unqualified">
+
+<xs:import namespace="http://example.net/xmlschema2"
+ schemaLocation="import0_0.imp"/>
+
+<xs:element name="bar">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="foo1" type="ns2:tfoo"/>
+ </xs:sequence>
+ </xs:complexType>
+</xs:element>
+
+
+</xs:schema>
diff --git a/libxml2/test/schemas/import1_0.imp b/libxml2/test/schemas/import1_0.imp
new file mode 100644
index 0000000..b7fd2ec
--- /dev/null
+++ b/libxml2/test/schemas/import1_0.imp
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://BAR">
+
+ <xsd:element name="bar.A"/>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/import1_0.xml b/libxml2/test/schemas/import1_0.xml
new file mode 100644
index 0000000..7046521
--- /dev/null
+++ b/libxml2/test/schemas/import1_0.xml
@@ -0,0 +1,11 @@
+<?xml version="1.0"?>
+<!-- This one tests the document access strategy for <import> -->
+<foo:foo
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO import1_0.xsd">
+ <foo:bar/>
+ <bar:bar.A/>
+ <bar:bar.B/>
+</foo:foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/import1_0.xsd b/libxml2/test/schemas/import1_0.xsd
new file mode 100644
index 0000000..309139c
--- /dev/null
+++ b/libxml2/test/schemas/import1_0.xsd
@@ -0,0 +1,30 @@
+<?xml version="1.0"?>
+<!-- This one tests the document access strategy for <import> -->
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ elementFormDefault="qualified">
+ <xsd:import namespace="http://BAR" />
+
+ <!-- This document does not exist. -->
+ <xsd:import namespace="http://BAR" schemaLocation="import1_0bc.imp" />
+ <!-- This document is ok. -->
+ <xsd:import namespace="http://BAR" schemaLocation="import1_0.imp" />
+ <!-- This document will be skipped, since a schema for the namespace
+ "http://BAR" was already imported. -->
+ <xsd:import namespace="http://BAR" schemaLocation="import1_0b.imp" />
+
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="bar"/>
+ <xsd:element ref="bar:bar.A"/>
+ <!-- The reference cannot be resolved since
+ "import1_0b.imp" was skipped -->
+ <xsd:element ref="bar:bar.B"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/import1_0b.imp b/libxml2/test/schemas/import1_0b.imp
new file mode 100644
index 0000000..70bddd7
--- /dev/null
+++ b/libxml2/test/schemas/import1_0b.imp
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://BAR">
+
+ <xsd:element name="bar.B"/>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/import2_0.imp b/libxml2/test/schemas/import2_0.imp
new file mode 100644
index 0000000..298e6b1
--- /dev/null
+++ b/libxml2/test/schemas/import2_0.imp
@@ -0,0 +1,24 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ elementFormDefault="qualified">
+
+ <!-- We need to import the namespace for the schema to be valid. -->
+ <xsd:import namespace="http://BAR"/>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="foo.B" type="bar:fooType"/>
+ <xsd:element ref="bar:bar"/>
+ </xsd:sequence>
+ <xsd:attribute name="foo.attr"/>
+
+ </xsd:complexType>
+ </xsd:element>
+
+
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/import2_0.xml b/libxml2/test/schemas/import2_0.xml
new file mode 100644
index 0000000..67723d4
--- /dev/null
+++ b/libxml2/test/schemas/import2_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo:foo xmlns:foo="http://FOO"
+ xmlns:bar="http://BAR"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://BAR import2_0.xsd" foo.attr="oo">
+ <foo:foo.B/>
+ <bar:bar/>
+</foo:foo>
diff --git a/libxml2/test/schemas/import2_0.xsd b/libxml2/test/schemas/import2_0.xsd
new file mode 100644
index 0000000..6922bec
--- /dev/null
+++ b/libxml2/test/schemas/import2_0.xsd
@@ -0,0 +1,24 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ xmlns:foo="http://FOO"
+ targetNamespace="http://BAR"
+ elementFormDefault="qualified">
+
+ <xsd:import namespace="http://FOO" schemaLocation="import2_0.imp"/>
+
+ <xsd:simpleType name="fooType">
+ <xsd:restriction base="xsd:string">
+ <xsd:maxLength value="10"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:element name="bar">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="foo:foo" minOccurs="0"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/include1_0.inc b/libxml2/test/schemas/include1_0.inc
new file mode 100644
index 0000000..1745abe
--- /dev/null
+++ b/libxml2/test/schemas/include1_0.inc
@@ -0,0 +1,28 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema" >
+
+ <xsd:simpleType name="barType">
+ <xsd:restriction base="xsd:string">
+ <xsd:maxLength value="10" />
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:attribute name="bar" type="barType" fixed="o"/>
+
+ <xsd:element name="bar.B" type="xsd:anyURI" block="#all" nillable="true" final="restriction extension"/>
+
+ <xsd:element name="bar">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="bar.A" block="restriction" form="qualified" nillable="true" />
+ <xsd:element ref="bar.B"/>
+ </xsd:sequence>
+
+ <xsd:attribute ref="bar" xml:lang="DE">
+ <xsd:annotation/>
+ </xsd:attribute>
+ <xsd:attribute name="uri" type="xsd:token" />
+ </xsd:complexType>
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/include1_0.xml b/libxml2/test/schemas/include1_0.xml
new file mode 100644
index 0000000..8ffee0e
--- /dev/null
+++ b/libxml2/test/schemas/include1_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<foo:foo xmlns:foo="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO include1_0.xsd" foo:req="oo">
+ <foo:bar foo:bar="o" uri="asd"><foo:bar.A/><foo:bar.B>anyURI</foo:bar.B></foo:bar>
+ <boo/>
+
+</foo:foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/include1_0.xsd b/libxml2/test/schemas/include1_0.xsd
new file mode 100644
index 0000000..5e6d837
--- /dev/null
+++ b/libxml2/test/schemas/include1_0.xsd
@@ -0,0 +1,15 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO" version="">
+ <xsd:include schemaLocation="include1_0.inc" />
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="foo:bar"/>
+ <xsd:element name="boo" type="xsd:string"/>
+ </xsd:sequence>
+ <xsd:attribute name="req" use="required" form="qualified"/>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/include2_0.inc b/libxml2/test/schemas/include2_0.inc
new file mode 100644
index 0000000..3104cd5
--- /dev/null
+++ b/libxml2/test/schemas/include2_0.inc
@@ -0,0 +1,17 @@
+<?xml version="1.0"?>
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ elementFormDefault="qualified" attributeFormDefault="qualified"
+ blockDefault="extension" finalDefault="extension">
+
+ <xsd:element name="bar">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="bar.B" type="xsd:anyType"/>
+ </xsd:sequence>
+ <xsd:attribute name="bar"/>
+ </xsd:complexType>
+
+ </xsd:element>
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/include2_0.xml b/libxml2/test/schemas/include2_0.xml
new file mode 100644
index 0000000..b460b93
--- /dev/null
+++ b/libxml2/test/schemas/include2_0.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0"?>
+<foo:foo
+ xmlns:foo="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO include2_0.xsd">
+ <foo:bar foo:bar="ooo">
+ <foo:bar.B foo:bar="ooo"/>
+ </foo:bar>
+</foo:foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/include2_0.xsd b/libxml2/test/schemas/include2_0.xsd
new file mode 100644
index 0000000..5f63102
--- /dev/null
+++ b/libxml2/test/schemas/include2_0.xsd
@@ -0,0 +1,14 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+ <xsd:include schemaLocation="include2_0.inc" />
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element ref="foo:bar"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/include3_0.inc b/libxml2/test/schemas/include3_0.inc
new file mode 100644
index 0000000..c0436e8
--- /dev/null
+++ b/libxml2/test/schemas/include3_0.inc
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<xsd:schema
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="bar" />
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/include3_0.xml b/libxml2/test/schemas/include3_0.xml
new file mode 100644
index 0000000..e880cc5
--- /dev/null
+++ b/libxml2/test/schemas/include3_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<foo:foo
+ xmlns:foo="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO include3_0.xsd">
+ <foo:bar />
+</foo:foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/include3_0.xsd b/libxml2/test/schemas/include3_0.xsd
new file mode 100644
index 0000000..5319486
--- /dev/null
+++ b/libxml2/test/schemas/include3_0.xsd
@@ -0,0 +1,9 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO"
+ xmlns:foo="http://FOO">
+ <xsd:include schemaLocation="include3_0.inc" />
+
+ <xsd:element name="bar"/>
+ <xsd:element name="foo"/>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/item_0.xml b/libxml2/test/schemas/item_0.xml
new file mode 100644
index 0000000..19d0790
--- /dev/null
+++ b/libxml2/test/schemas/item_0.xml
@@ -0,0 +1,6 @@
+<Item partNum="926-AA" shipBy="air">
+<productName>foo</productName>
+<quantity>2</quantity>
+<USPrice>1.0</USPrice>
+<comment>No comment !</comment>
+</Item>
diff --git a/libxml2/test/schemas/item_0.xsd b/libxml2/test/schemas/item_0.xsd
new file mode 100644
index 0000000..315e06e
--- /dev/null
+++ b/libxml2/test/schemas/item_0.xsd
@@ -0,0 +1,39 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="comment" type="xsd:string"/>
+ <!-- Stock Keeping Unit, a code for identifying products -->
+ <xsd:simpleType name="SKU">
+ <xsd:restriction base="xsd:string">
+ <xsd:pattern value="\d{3}-[A-Z]{2}"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ <xsd:element name="Item">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="productName" type="xsd:string"/>
+ <xsd:element name="quantity">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:positiveInteger">
+ <xsd:maxExclusive value="100"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="USPrice" type="xsd:decimal"/>
+ <xsd:element ref="comment" minOccurs="0"/>
+ <xsd:element name="shipDate" type="xsd:date" minOccurs="0"/>
+ </xsd:sequence>
+ <xsd:attribute name="partNum" type="SKU" use="required"/>
+ <!-- add weightKg and shipBy attributes -->
+ <xsd:attribute name="weightKg" type="xsd:decimal"/>
+ <xsd:attribute name="shipBy">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:string">
+ <xsd:enumeration value="air"/>
+ <xsd:enumeration value="land"/>
+ <xsd:enumeration value="any"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:attribute>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/item_1.xsd b/libxml2/test/schemas/item_1.xsd
new file mode 100644
index 0000000..3cf966e
--- /dev/null
+++ b/libxml2/test/schemas/item_1.xsd
@@ -0,0 +1,42 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:element name="comment" type="xsd:string"/>
+<!-- Stock Keeping Unit, a code for identifying products -->
+ <xsd:simpleType name="SKU">
+ <xsd:restriction base="xsd:string">
+ <xsd:pattern value="\d{3}-[A-Z]{2}"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ <xsd:element name="Item">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="productName" type="xsd:string"/>
+ <xsd:element name="quantity">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:positiveInteger">
+ <xsd:maxExclusive value="100"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="USPrice" type="xsd:decimal"/>
+ <xsd:element ref="comment" minOccurs="0"/>
+ <xsd:element name="shipDate" type="xsd:date" minOccurs="0"/>
+ </xsd:sequence>
+<!-- attributeGroup replaces individual declarations -->
+ <xsd:attributeGroup ref="ItemDelivery"/>
+ </xsd:complexType>
+ </xsd:element>
+ <xsd:attributeGroup name="ItemDelivery">
+ <xsd:attribute name="partNum" type="SKU" use="required"/>
+ <xsd:attribute name="weightKg" type="xsd:decimal"/>
+ <xsd:attribute name="shipBy">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:string">
+ <xsd:enumeration value="air"/>
+ <xsd:enumeration value="land"/>
+ <xsd:enumeration value="any"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:attribute>
+ </xsd:attributeGroup>
+</xsd:schema>
diff --git a/libxml2/test/schemas/length1_0.xml b/libxml2/test/schemas/length1_0.xml
new file mode 100644
index 0000000..0a8cd3f
--- /dev/null
+++ b/libxml2/test/schemas/length1_0.xml
@@ -0,0 +1 @@
+<width unit="cm">25</width>
diff --git a/libxml2/test/schemas/length1_0.xsd b/libxml2/test/schemas/length1_0.xsd
new file mode 100644
index 0000000..8a1ba0f
--- /dev/null
+++ b/libxml2/test/schemas/length1_0.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:complexType name="length1">
+ <xs:simpleContent>
+ <xs:extension base="xs:nonNegativeInteger">
+ <xs:attribute name="unit" type="xs:NMTOKEN"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ <xs:element name="width" type="length1"/>
+</xs:schema>
diff --git a/libxml2/test/schemas/length2_0.xml b/libxml2/test/schemas/length2_0.xml
new file mode 100644
index 0000000..5c851da
--- /dev/null
+++ b/libxml2/test/schemas/length2_0.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<depth>
+ <size>25</size>
+ <unit>cm</unit>
+</depth>
diff --git a/libxml2/test/schemas/length2_0.xsd b/libxml2/test/schemas/length2_0.xsd
new file mode 100644
index 0000000..76d73c0
--- /dev/null
+++ b/libxml2/test/schemas/length2_0.xsd
@@ -0,0 +1,14 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:complexType name="length2">
+ <xs:complexContent>
+ <xs:restriction base="xs:anyType">
+ <xs:sequence>
+ <xs:element name="size" type="xs:nonNegativeInteger"/>
+ <xs:element name="unit" type="xs:NMTOKEN"/>
+ </xs:sequence>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ <xs:element name="depth" type="length2"/>
+</xs:schema>
diff --git a/libxml2/test/schemas/length3_0.xml b/libxml2/test/schemas/length3_0.xml
new file mode 100644
index 0000000..5c851da
--- /dev/null
+++ b/libxml2/test/schemas/length3_0.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<depth>
+ <size>25</size>
+ <unit>cm</unit>
+</depth>
diff --git a/libxml2/test/schemas/length3_0.xsd b/libxml2/test/schemas/length3_0.xsd
new file mode 100644
index 0000000..b97e688
--- /dev/null
+++ b/libxml2/test/schemas/length3_0.xsd
@@ -0,0 +1,10 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:complexType name="length3">
+ <xs:sequence>
+ <xs:element name="size" type="xs:non-positive-integer"/>
+ <xs:element name="unit" type="xs:NMTOKEN"/>
+ </xs:sequence>
+ </xs:complexType>
+ <xs:element name="depth" type="length3"/>
+</xs:schema>
diff --git a/libxml2/test/schemas/list0_0.xml b/libxml2/test/schemas/list0_0.xml
new file mode 100644
index 0000000..a58fe8b
--- /dev/null
+++ b/libxml2/test/schemas/list0_0.xml
@@ -0,0 +1,6 @@
+<test>
+ <string>hello world</string>
+ <string>hello world</string>
+ <string>hello world</string>
+ <string>hello world</string>
+</test>
diff --git a/libxml2/test/schemas/list0_0.xsd b/libxml2/test/schemas/list0_0.xsd
new file mode 100644
index 0000000..33d7d66
--- /dev/null
+++ b/libxml2/test/schemas/list0_0.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified" attributeFormDefault="unqualified">
+ <xs:element name="test">
+ <xs:annotation>
+ <xs:documentation>Comment describing your root element</xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="string" type="xs:string" minOccurs="2" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/list0_1.xml b/libxml2/test/schemas/list0_1.xml
new file mode 100644
index 0000000..8878e5d
--- /dev/null
+++ b/libxml2/test/schemas/list0_1.xml
@@ -0,0 +1,3 @@
+<test>
+ <string>hello world</string>
+</test>
diff --git a/libxml2/test/schemas/list0_1.xsd b/libxml2/test/schemas/list0_1.xsd
new file mode 100644
index 0000000..8966075
--- /dev/null
+++ b/libxml2/test/schemas/list0_1.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified" attributeFormDefault="unqualified">
+ <xs:element name="test">
+ <xs:annotation>
+ <xs:documentation>Comment describing your root element</xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="string" type="xs:string" minOccurs="2" maxOccurs="3"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/list0_2.xml b/libxml2/test/schemas/list0_2.xml
new file mode 100644
index 0000000..e94d481
--- /dev/null
+++ b/libxml2/test/schemas/list0_2.xml
@@ -0,0 +1,4 @@
+<test>
+ <string>hello world</string>
+ <string>hello world</string>
+</test>
diff --git a/libxml2/test/schemas/mixed0_0.xml b/libxml2/test/schemas/mixed0_0.xml
new file mode 100644
index 0000000..5864343
--- /dev/null
+++ b/libxml2/test/schemas/mixed0_0.xml
@@ -0,0 +1 @@
+<my>x</my>
diff --git a/libxml2/test/schemas/mixed0_0.xsd b/libxml2/test/schemas/mixed0_0.xsd
new file mode 100644
index 0000000..a82226ec
--- /dev/null
+++ b/libxml2/test/schemas/mixed0_0.xsd
@@ -0,0 +1,5 @@
+<xs:schema xmlns:xs='http://www.w3.org/2001/XMLSchema'>
+ <xs:element name='my'>
+ <xs:complexType mixed='true'/>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/mixed1_0.xml b/libxml2/test/schemas/mixed1_0.xml
new file mode 100644
index 0000000..d8cf633
--- /dev/null
+++ b/libxml2/test/schemas/mixed1_0.xml
@@ -0,0 +1 @@
+<my myattr='y'>x</my>
diff --git a/libxml2/test/schemas/mixed1_0.xsd b/libxml2/test/schemas/mixed1_0.xsd
new file mode 100644
index 0000000..a9ea6cc
--- /dev/null
+++ b/libxml2/test/schemas/mixed1_0.xsd
@@ -0,0 +1,7 @@
+<xs:schema xmlns:xs='http://www.w3.org/2001/XMLSchema'>
+ <xs:element name='my'>
+ <xs:complexType mixed='true'>
+ <xs:attribute name='myattr' type='xs:string' use='required'/>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/ns0_0.xml b/libxml2/test/schemas/ns0_0.xml
new file mode 100644
index 0000000..1cbaf1f
--- /dev/null
+++ b/libxml2/test/schemas/ns0_0.xml
@@ -0,0 +1,2 @@
+<foo xmlns="http://example.com/xsd/ns" id="abc"/>
+
diff --git a/libxml2/test/schemas/ns0_0.xsd b/libxml2/test/schemas/ns0_0.xsd
new file mode 100644
index 0000000..38951d6
--- /dev/null
+++ b/libxml2/test/schemas/ns0_0.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://example.com/xsd/ns"
+ elementFormDefault="qualified"
+ attributeFormDefault="unqualified">
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:simpleContent>
+ <xsd:extension base="xsd:string">
+ <xsd:attribute name="id" type="xsd:ID"/>
+ </xsd:extension>
+ </xsd:simpleContent>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/ns0_1.xml b/libxml2/test/schemas/ns0_1.xml
new file mode 100644
index 0000000..6550f5c
--- /dev/null
+++ b/libxml2/test/schemas/ns0_1.xml
@@ -0,0 +1,2 @@
+<n:foo xmlns:n="http://example.com/xsd/ns" id="abc"/>
+
diff --git a/libxml2/test/schemas/ns0_1.xsd b/libxml2/test/schemas/ns0_1.xsd
new file mode 100644
index 0000000..df2e79a
--- /dev/null
+++ b/libxml2/test/schemas/ns0_1.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://example.com/xsd/ns"
+ elementFormDefault="qualified"
+ attributeFormDefault="qualified">
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:simpleContent>
+ <xsd:extension base="xsd:string">
+ <xsd:attribute name="id" type="xsd:ID"/>
+ </xsd:extension>
+ </xsd:simpleContent>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/ns0_2.xml b/libxml2/test/schemas/ns0_2.xml
new file mode 100644
index 0000000..8f2bdba
--- /dev/null
+++ b/libxml2/test/schemas/ns0_2.xml
@@ -0,0 +1,2 @@
+<foo id="abc"/>
+
diff --git a/libxml2/test/schemas/ns0_3.xml b/libxml2/test/schemas/ns0_3.xml
new file mode 100644
index 0000000..4c5c1e4
--- /dev/null
+++ b/libxml2/test/schemas/ns0_3.xml
@@ -0,0 +1,2 @@
+<n:foo xmlns:n="http://example.com/xsd/ns" n:id="abc"/>
+
diff --git a/libxml2/test/schemas/ns0_4.xml b/libxml2/test/schemas/ns0_4.xml
new file mode 100644
index 0000000..dcdd418
--- /dev/null
+++ b/libxml2/test/schemas/ns0_4.xml
@@ -0,0 +1,3 @@
+<l:foo xmlns:l="http://example.com/xsd/ns"
+ xmlns:b="http://example.com/xsd/ns" b:id="abc"/>
+
diff --git a/libxml2/test/schemas/ns1_0.xml b/libxml2/test/schemas/ns1_0.xml
new file mode 100644
index 0000000..410ed26
--- /dev/null
+++ b/libxml2/test/schemas/ns1_0.xml
@@ -0,0 +1,2 @@
+<my xmlns='http://my.ns/'
+>some</my>
diff --git a/libxml2/test/schemas/ns1_0.xsd b/libxml2/test/schemas/ns1_0.xsd
new file mode 100644
index 0000000..a77ec57
--- /dev/null
+++ b/libxml2/test/schemas/ns1_0.xsd
@@ -0,0 +1,3 @@
+<schema xmlns='http://www.w3.org/2001/XMLSchema' targetNamespace='http://my.ns/'>
+ <element name='my' type='string'/>
+</schema>
diff --git a/libxml2/test/schemas/ns2_0.xml b/libxml2/test/schemas/ns2_0.xml
new file mode 100644
index 0000000..c3bb126
--- /dev/null
+++ b/libxml2/test/schemas/ns2_0.xml
@@ -0,0 +1 @@
+<m:my xmlns:m='http://my.ns/' m:other='1'>content</m:my>
diff --git a/libxml2/test/schemas/ns2_0.xsd b/libxml2/test/schemas/ns2_0.xsd
new file mode 100644
index 0000000..9393beb
--- /dev/null
+++ b/libxml2/test/schemas/ns2_0.xsd
@@ -0,0 +1,15 @@
+<schema xmlns:my='http://my.ns/'
+ xmlns='http://www.w3.org/2001/XMLSchema'
+ targetNamespace='http://my.ns/'
+ >
+ <attribute name='other' type='string'/>
+ <element name='my'>
+ <complexType>
+ <simpleContent>
+ <extension base='string'>
+ <attribute ref='my:other'/>
+ </extension>
+ </simpleContent>
+ </complexType>
+ </element>
+</schema>
diff --git a/libxml2/test/schemas/nvdcve_0.xml b/libxml2/test/schemas/nvdcve_0.xml
new file mode 100644
index 0000000..20a0aed
--- /dev/null
+++ b/libxml2/test/schemas/nvdcve_0.xml
@@ -0,0 +1,5235 @@
+<?xml version='1.0' encoding='UTF-8'?>
+<nvd xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://nvd.nist.gov/feeds/cve/1.2" nvd_xml_version="1.2" pub_date="2008-10-17" xsi:schemaLocation="http://nvd.nist.gov/feeds/cve/1.2 http://nvd.nist.gov/schema/nvdcve.xsd">
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-4503" seq="2008-4503" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-11">
+ <desc>
+ <descript source="cve">The Settings Manager in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to cause victims to unknowingly click on a link or dialog via access control dialogs disguised as normal graphical elements, as demonstrated by hijacking the camera or microphone, and related to "clickjacking."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45721">adobe-flash-click-hijacking(45721)</ref>
+ <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020996">1020996</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31625">31625</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2764">ADV-2008-2764</ref>
+ <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-08.html" adv="1">http://www.adobe.com/support/security/advisories/apsa08-08.html</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32163" adv="1">32163</ref>
+ <ref source="MISC" url="http://ha.ckers.org/blog/20081007/clickjacking-details/">http://ha.ckers.org/blog/20081007/clickjacking-details/</ref>
+ <ref source="MISC" url="http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/">http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="adobe" name="flash_player">
+ <vers num="7" />
+ <vers num="7.0" />
+ <vers num="7.0.1" />
+ <vers num="7.0.25" />
+ <vers edition="" num="7.0.63" />
+ <vers edition=":linux" num="7.0.63" />
+ <vers num="7.0.69.0" />
+ <vers num="7.0.70.0" />
+ <vers edition="" num="7.0_r67" />
+ <vers edition=":solaris" num="7.0_r67" />
+ <vers num="7.1" />
+ <vers num="7.1.1" />
+ <vers num="7.2" />
+ <vers edition="" num="8" />
+ <vers edition=":professional" num="8" />
+ <vers edition=":pro" num="8" />
+ <vers num="8.0" />
+ <vers num="8.0.24.0" />
+ <vers num="8.0.34.0" />
+ <vers num="8.0.35.0" />
+ <vers num="8.0.39.0" />
+ <vers num="9" />
+ <vers num="9.0.114.0" />
+ <vers num="9.0.115.0" />
+ <vers num="9.0.124.0" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-4504" seq="2008-4504" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in Mplayer.exe in Herosoft Inc. Hero DVD Player 3.0.8 allows user-assisted remote attackers to execute arbitrary code via an M3u file with a "long entry." NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31627">31627</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/31933" adv="1">31933</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="herosoft" name="hero_dvd_player">
+ <vers num="3.0.8" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)" CVSS_base_score="7.8" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.9" name="CVE-2008-4505" seq="2008-4505" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.8" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in IBM Lotus Quickr 8.1 before Fix pack 1 (8.1.0.1) might allow attackers to cause a denial of service (system crash) via a "nonstandard URL argument" to the OpenDocument command. NOTE: due to lack of details from the vendor, it is not clear whether this is a vulnerability.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45692">lotus-quickr-opendocument-dos(45692)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31608">31608</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2753" adv="1">ADV-2008-2753</ref>
+ <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg27013341">http://www-01.ibm.com/support/docview.wss?uid=swg27013341</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32098" adv="1">32098</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ibm" name="lotus_quickr">
+ <vers num="8.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4506" seq="2008-4506" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-11">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in IBM Lotus Quickr 8.1 before Fix pack 1 (8.1.0.1) allows a place manager to "demote or delete a place superuser group" via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45694">lotus-quickr-placemanager-security-bypass(45694)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31608">31608</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2753" adv="1">ADV-2008-2753</ref>
+ <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg27013341">http://www-01.ibm.com/support/docview.wss?uid=swg27013341</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32098" adv="1">32098</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ibm" name="lotus_quickr">
+ <vers num="8.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4507" seq="2008-4507" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in IBM Lotus Quickr 8.1 before Fix pack 1 (8.1.0.1) allows editors to delete pages that were created by a different author via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45693">lotus-quickr-editor-security-bypass(45693)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31608">31608</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2753" adv="1">ADV-2008-2753</ref>
+ <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg27013341">http://www-01.ibm.com/support/docview.wss?uid=swg27013341</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32098" adv="1">32098</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ibm" name="lotus_quickr">
+ <vers num="8.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)" CVSS_base_score="7.8" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.9" name="CVE-2008-4508" seq="2008-4508" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.8" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Stack-based buffer overflow in the file parsing function in Tonec Internet Download Manager, possibly 5.14 and earlier, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted AppleDouble file containing a long string. NOTE: this is probably a different vulnerability than CVE-2005-2210.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45711">internetdownloadmanager-file-bo(45711)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31603">31603</ref>
+ <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/31603.pl">http://downloads.securityfocus.com/vulnerabilities/exploits/31603.pl</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="tonec_inc." name="internet_download_manager">
+ <vers num="5.14" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4509" seq="2008-4509" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Unrestricted file upload vulnerability in processFiles.php in FOSS Gallery Admin and FOSS Gallery Public 1.0 beta allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the root directory.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45683">fossgallery-multiple-file-upload(45683)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31574">31574</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6680">6680</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6674">6674</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6670">6670</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="foss_gallery" name="foss_gallery">
+ <vers edition="beta" num="1.0" />
+ <vers edition="beta:public" num="1.0" />
+ <vers edition="beta:admin" num="1.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)" CVSS_base_score="4.9" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="6.9" name="CVE-2008-4510" seq="2008-4510" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="4.9" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Microsoft Windows Vista Home and Ultimate Edition SP1 and earlier allows local users to cause a denial of service (page fault and system crash) via multiple attempts to access a virtual address in a PAGE_NOACCESS memory page.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31570">31570</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6671">6671</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32115" adv="1">32115</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows-nt">
+ <vers edition="" num="vista" />
+ <vers edition=":home_premium" num="vista" />
+ <vers edition=":x64-home_premium" num="vista" />
+ <vers edition=":x64-ultimate" num="vista" />
+ <vers edition="sp1" num="vista" />
+ <vers edition="sp1:x64-home_premium" num="vista" />
+ <vers edition="sp1:ultimate" num="vista" />
+ <vers edition="sp1:x64-ultimate" num="vista" />
+ <vers edition="sp1:home_premium" num="vista" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4511" seq="2008-4511" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Todd Woolums ASP News Management, possibly 2.21, stores db/news.mdb under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/496787/100/0/threaded">20080927 ASP News Remote Password Disclouse Vulnerability</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="todd_woolums" name="asp_news_management">
+ <vers num="2.21" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4512" seq="2008-4512" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-09">
+ <desc>
+ <descript source="cve">ASP/MS Access Shoutbox, probably 1.1 beta, stores db/shoutdb.mdb under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/496789/100/0/threaded">20080927 shoutbox Remote Password Disclouse Vulnerability</ref>
+ </refs>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4513" seq="2008-4513" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in BBcode API module in Phorum 5.2.8 allows remote attackers to inject arbitrary web script or HTML via nested BBcode image tags.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45686">phorum-img-xss(45686)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31589">31589</ref>
+ <ref source="CONFIRM" url="http://trac.phorum.org/changeset/3528">http://trac.phorum.org/changeset/3528</ref>
+ <ref source="MISC" url="http://nulledcore.com/?p=126">http://nulledcore.com/?p=126</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="phorum" name="phorum">
+ <vers num="5.2.8" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4514" seq="2008-4514" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-09">
+ <desc>
+ <descript source="cve">The HTML parser in KDE Konqueror 3.5.9 allows remote attackers to cause a denial of service (application crash) via a font tag with a long color value, which triggers an assertion error.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31605">31605</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6689">6689</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="konqueror" name="konqueror">
+ <vers num="3.5.9" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4515" seq="2008-4515" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-09">
+ <desc>
+ <descript source="cve">Blue Coat K9 Web Protection 4.0.230 Beta relies on client-side JavaScript as a protection mechanism, which allows remote attackers to bypass authentication and access the (1) summary, (2) detail, (3) overrides, and (4) pwemail pages by disabling JavaScript.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45696">k9webprotection-multiple-auth-bypass(45696)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31584">31584</ref>
+ <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2008/Oct/0070.html">20081004 Blue Coat K9 Web Protection V4.0.230 Beta Vulnerability</ref>
+ <ref source="MISC" url="http://dicas3000.blogspot.com/2008/10/blue-coat-k9-web-protection-v40230-beta.html">http://dicas3000.blogspot.com/2008/10/blue-coat-k9-web-protection-v40230-beta.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="blue_coat_systems" name="k9_web_protection">
+ <vers edition="beta" num="4.0.230" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4516" seq="2008-4516" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-09">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in galerie.php in Galerie 3.2 allows remote attackers to execute arbitrary SQL commands via the pic parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45698">galerie-pic-sql-injection(45698)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31593">31593</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6675">6675</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="galerie" name="galerie">
+ <vers num="3.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4517" seq="2008-4517" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-09">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in leggi.php in geccBBlite 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31585">31585</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6677">6677</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="geccbblite" name="geccbblite">
+ <vers num="2.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4518" seq="2008-4518" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Multiple SQL injection vulnerabilities in Fastpublish CMS 1.9.9.9.9 d (1.9999 d) allow remote attackers to execute arbitrary SQL commands via the (1) sprache parameter to index2.php and the (2) artikel parameter to index.php.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31582">31582</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6678">6678</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32126" adv="1">32126</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="fastpublish" name="fastpublish_cms">
+ <vers num="1.9.9.9.9d" />
+ <vers num="1.9999d" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4519" seq="2008-4519" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Multiple directory traversal vulnerabilities in Fastpublish CMS 1.9999 d allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the target parameter to (1) index2.php and (2) index.php.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31582">31582</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6678">6678</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32126" adv="1">32126</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="fastpublish" name="fastpublish_cms">
+ <vers num="1.9.9.9.9d" />
+ <vers num="1.9999d" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4520" seq="2008-4520" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in bulk_update.pl in AutoNessus before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the remark parameter.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31559">31559</ref>
+ <ref source="CONFIRM" patch="1" url="http://sourceforge.net/project/shownotes.php?group_id=216367&amp;release_id=630124">http://sourceforge.net/project/shownotes.php?group_id=216367&amp;release_id=630124</ref>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45634">autonessus-bulkupdate-xss(45634)</ref>
+ <ref source="MISC" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2141884&amp;group_id=216367&amp;atid=1037394" adv="1">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2141884&amp;group_id=216367&amp;atid=1037394</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32046" adv="1">32046</ref>
+ <ref source="MISC" url="http://autonessus.cvs.sourceforge.net/viewvc/autonessus/AutoNessus/www/bulk_update.pl?r1=1.2&amp;r2=1.3">http://autonessus.cvs.sourceforge.net/viewvc/autonessus/AutoNessus/www/bulk_update.pl?r1=1.2&amp;r2=1.3</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="autonessus" name="autonessus">
+ <vers num="1.0" />
+ <vers num="1.1" />
+ <vers num="1.1.1" />
+ <vers num="1.2" />
+ <vers num="1.2.1" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4521" seq="2008-4521" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in thisraidprogress.php in the World of Warcraft tracker infusion (raidtracker_panel) module 2.0 for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the INFO_RAID_ID parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31579">31579</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6682">6682</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="php-fusion" name="world_of_warcraft_tracker_infusion_module">
+ <vers num="2.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4522" seq="2008-4522" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Multiple directory traversal vulnerabilities in JMweb MP3 Music Audio Search and Download Script allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the src parameter to (1) listen.php and (2) download.php.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31573">31573</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6669">6669</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32141" adv="1">32141</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="jesse-web" name="jmweb_mp3_music_audio_search_and_download_script">
+ <vers num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4523" seq="2008-4523" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in login.php in IP Reg 0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the user_name parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45641">ipreg-login-sql-injection(45641)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31561">31561</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6657">6657</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ip_reg" name="ip_reg">
+ <vers num="0.1" />
+ <vers num="0.2" />
+ <vers num="0.3" />
+ <vers num="0.4" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4524" seq="2008-4524" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in the "Check User" feature (includes/check_user.php) in AdaptCMS Lite and AdaptCMS Pro 1.3 allows remote attackers to execute arbitrary SQL commands via the user_name parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" patch="1" url="http://www.adaptcms.com/article/51/News/URGENT-AdaptCMS-13-Security-Fix-Released/" adv="1">http://www.adaptcms.com/article/51/News/URGENT-AdaptCMS-13-Security-Fix-Released/</ref>
+ <ref source="SECUNIA" patch="1" url="http://secunia.com/advisories/32171" adv="1">32171</ref>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45642">adaptcmslite-checkuser-sql-injection(45642)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31557">31557</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6662">6662</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="adaptcms" name="adaptcms">
+ <vers edition="unknown" num="1.3" />
+ <vers edition="unknown:lite" num="1.3" />
+ <vers edition="unknown:pro" num="1.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4525" seq="2008-4525" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in index.php in AmpJuke 0.7.5 allows remote attackers to execute arbitrary SQL commands via the special parameter in a performerid action.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31592">31592</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32168" adv="1">32168</ref>
+ <ref source="MISC" url="http://packetstorm.linuxsecurity.com/0810-exploits/ampjuke-sql.txt">http://packetstorm.linuxsecurity.com/0810-exploits/ampjuke-sql.txt</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ampjuke" name="ampjuke">
+ <vers num="0.7.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4526" seq="2008-4526" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Multiple directory traversal vulnerabilities in CCMS 3.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the skin parameter to (1) index.php, (2) forums.php, (3) admin.php, (4) header.php, (5) pages/story.php and (6) pages/poll.php.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31566">31566</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6663">6663</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="customcms" name="ccms">
+ <vers num="3.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4527" seq="2008-4527" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in recept.php in the Recepies (Recept) module 1.1 for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the kat_id parameter in a kategorier action. NOTE: some of these details are obtained from third party information.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31578">31578</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6683">6683</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32004" adv="1">32004</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="php-fusion" name="recepies_module">
+ <vers num="1.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4528" seq="2008-4528" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Directory traversal vulnerability in notes.php in Phlatline's Personal Information Manager (pPIM) 1.01 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the id parameter in an edit action.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31571">31571</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6667">6667</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="phlatline" name="personal_information_manager">
+ <vers num="1.01" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4529" seq="2008-4529" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-11">
+ <desc>
+ <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in asiCMS alpha 0.208 allow remote attackers to execute arbitrary PHP code via a URL in the _ENV[asicms][path] parameter to (1) Association.php, (2) BigMath.php, (3) DiffieHellman.php, (4) DumbStore.php, (5) Extension.php, (6) FileStore.php, (7) HMAC.php, (8) MemcachedStore.php, (9) Message.php, (10) Nonce.php, (11) SQLStore.php, (12) SReg.php, (13) TrustRoot.php, and (14) URINorm.php in classes/Auth/OpenID/; and (15) XRDS.php, (16) XRI.php and (17) XRIRes.php in classes/Auth/Yadis/.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31601">31601</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6685">6685</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="asicms" name="asicms">
+ <vers edition="alpha" num="0.208" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4530" seq="2008-4530" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in Brilliant Gallery 5.x before 5.x-4.2, a module for Drupal, allows remote authenticated users with permissions to inject arbitrary web script or HTML via unspecified vectors related to posting of answers.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="CONFIRM" patch="1" url="http://drupal.org/node/315919" adv="1">http://drupal.org/node/315919</ref>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45636">brilliantgallery-unspecified-xss(45636)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31554">31554</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32106" adv="1">32106</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="drupal" name="brilliant_gallery">
+ <vers num="5.x-1.0" />
+ <vers num="5.x-1.1" />
+ <vers num="5.x-1.2" />
+ <vers num="5.x-2.1" />
+ <vers num="5.x-2.10" />
+ <vers num="5.x-2.11" />
+ <vers num="5.x-2.12" />
+ <vers num="5.x-2.13" />
+ <vers num="5.x-2.14" />
+ <vers num="5.x-2.15" />
+ <vers num="5.x-2.16" />
+ <vers num="5.x-2.17" />
+ <vers num="5.x-2.2" />
+ <vers num="5.x-2.3" />
+ <vers num="5.x-2.4" />
+ <vers num="5.x-2.5" />
+ <vers num="5.x-2.6" />
+ <vers num="5.x-2.7" />
+ <vers num="5.x-2.8" />
+ <vers num="5.x-2.9" />
+ <vers num="5.x-3.0" />
+ <vers num="5.x-3.1" />
+ <vers num="5.x-3.2" />
+ <vers num="5.x-3.3" />
+ <vers num="5.x-4.0" />
+ <vers num="5.x-4.1" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4531" seq="2008-4531" severity="High" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in Brilliant Gallery 5.x before 5.x-4.2, a module for Drupal, allows remote attackers to execute arbitrary SQL commands via unspecified vectors, related to queries. NOTE: this might be the same issue as CVE-2008-4338.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" patch="1" url="http://xforce.iss.net/xforce/xfdb/45637">brilliantgallery-unspecified-sql-injection(45637)</ref>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31554">31554</ref>
+ <ref source="SECUNIA" patch="1" url="http://secunia.com/advisories/32106" adv="1">32106</ref>
+ <ref source="CONFIRM" patch="1" url="http://drupal.org/node/315919">http://drupal.org/node/315919</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="drupal" name="brilliant_gallery">
+ <vers num="5.x-1.0" />
+ <vers num="5.x-1.1" />
+ <vers num="5.x-1.2" />
+ <vers num="5.x-2.1" />
+ <vers num="5.x-2.10" />
+ <vers num="5.x-2.11" />
+ <vers num="5.x-2.12" />
+ <vers num="5.x-2.13" />
+ <vers num="5.x-2.14" />
+ <vers num="5.x-2.15" />
+ <vers num="5.x-2.16" />
+ <vers num="5.x-2.17" />
+ <vers num="5.x-2.2" />
+ <vers num="5.x-2.3" />
+ <vers num="5.x-2.4" />
+ <vers num="5.x-2.5" />
+ <vers num="5.x-2.6" />
+ <vers num="5.x-2.7" />
+ <vers num="5.x-2.8" />
+ <vers num="5.x-2.9" />
+ <vers num="5.x-3.0" />
+ <vers num="5.x-3.1" />
+ <vers num="5.x-3.2" />
+ <vers num="5.x-3.3" />
+ <vers num="5.x-4.0" />
+ <vers num="5.x-4.1" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4532" seq="2008-4532" severity="Medium" type="CVE" published="2008-10-09" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in MaxiScript Website Directory allows remote attackers to inject arbitrary web script or HTML via the keyword parameter in a search action.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45657">websitedirectory-index-xss(45657)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31562">31562</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/496967/100/0/threaded">20081003 Website Directory - XSS Exploit</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32176" adv="1">32176</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="maxiscript" name="website_directory">
+ <vers num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-3432" seq="2008-3432" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" patch="1" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/08/01/1">[oss-security] 20080731 Re: Re: More arbitrary code executions in Netrw</ref>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/07/15/4">[oss-security] 20080715 Re: Re: More arbitrary code executions in Netrw</ref>
+ <ref source="CONFIRM" url="ftp://ftp.vim.org/pub/vim/patches/6.3/6.3.059">ftp://ftp.vim.org/pub/vim/patches/6.3/6.3.059</ref>
+ <ref source="CONFIRM" url="ftp://ftp.vim.org/pub/vim/patches/6.2.429">ftp://ftp.vim.org/pub/vim/patches/6.2.429</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="vim" name="vim">
+ <vers num="6.2" />
+ <vers num="6.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-3641" seq="2008-3641" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="CONFIRM" patch="1" url="http://cups.org/articles.php?L575" adv="1">http://www.cups.org/articles.php?L575</ref>
+ <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0937.html">RHSA-2008:0937</ref>
+ <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:211">MDVSA-2008:211</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2782">ADV-2008-2782</ref>
+ <ref source="CONFIRM" url="http://www.cups.org/str.php?L2911">http://www.cups.org/str.php?L2911</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32226">32226</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32084">32084</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="cups">
+ <vers num="1.1" />
+ <vers num="1.1.1" />
+ <vers num="1.1.10" />
+ <vers num="1.1.10-1" />
+ <vers num="1.1.11" />
+ <vers num="1.1.12" />
+ <vers num="1.1.13" />
+ <vers num="1.1.14" />
+ <vers num="1.1.15" />
+ <vers num="1.1.16" />
+ <vers num="1.1.17" />
+ <vers num="1.1.18" />
+ <vers edition="rc1" num="1.1.19" />
+ <vers edition="rc2" num="1.1.19" />
+ <vers edition="rc3" num="1.1.19" />
+ <vers edition="rc4" num="1.1.19" />
+ <vers edition="rc5" num="1.1.19" />
+ <vers num="1.1.2" />
+ <vers edition="rc1" num="1.1.20" />
+ <vers edition="rc2" num="1.1.20" />
+ <vers edition="rc3" num="1.1.20" />
+ <vers edition="rc4" num="1.1.20" />
+ <vers edition="rc5" num="1.1.20" />
+ <vers edition="rc6" num="1.1.20" />
+ <vers edition="rc1" num="1.1.21" />
+ <vers edition="rc2" num="1.1.21" />
+ <vers edition="rc1" num="1.1.22" />
+ <vers edition="rc2" num="1.1.22" />
+ <vers edition="rc1" num="1.1.23" />
+ <vers num="1.1.3" />
+ <vers num="1.1.4" />
+ <vers num="1.1.5" />
+ <vers num="1.1.5-1" />
+ <vers num="1.1.5-2" />
+ <vers num="1.1.6" />
+ <vers num="1.1.6-1" />
+ <vers num="1.1.6-2" />
+ <vers num="1.1.6-3" />
+ <vers num="1.1.7" />
+ <vers num="1.1.8" />
+ <vers num="1.1.9" />
+ <vers num="1.1.9-1" />
+ <vers edition="b1" num="1.2" />
+ <vers edition="b2" num="1.2" />
+ <vers edition="rc1" num="1.2" />
+ <vers edition="rc2" num="1.2" />
+ <vers edition="rc3" num="1.2" />
+ <vers num="1.2.0" />
+ <vers num="1.2.1" />
+ <vers num="1.2.10" />
+ <vers num="1.2.11" />
+ <vers num="1.2.12" />
+ <vers num="1.2.2" />
+ <vers num="1.2.3" />
+ <vers num="1.2.4" />
+ <vers num="1.2.5" />
+ <vers num="1.2.6" />
+ <vers num="1.2.7" />
+ <vers num="1.2.8" />
+ <vers num="1.2.9" />
+ <vers edition="b1" num="1.3" />
+ <vers edition="rc1" num="1.3" />
+ <vers edition="rc2" num="1.3" />
+ <vers num="1.3.0" />
+ <vers num="1.3.1" />
+ <vers num="1.3.2" />
+ <vers num="1.3.3" />
+ <vers num="1.3.4" />
+ <vers num="1.3.5" />
+ <vers num="1.3.6" />
+ <vers num="1.3.7" />
+ <vers num="1.3.8" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-3642" seq="2008-3642" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Buffer overflow in ColorSync in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via an image with a crafted ICC profile.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)" CVSS_base_score="7.8" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.9" name="CVE-2008-3643" seq="2008-3643" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="7.8" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in Finder in Mac OS X 10.5.5 allows user-assisted attackers to cause a denial of service (continuous termination and restart) via a crafted Desktop file that generates an error when producing its icon, related to an "error recovery issue."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" adv="1">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.5.5" />
+ </prod>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-3645" seq="2008-3645" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in the local IPC component in the EAPOLController plugin for configd (Networking component) in Mac OS X 10.4.11 and 10.5.5 allows local users to execute arbitrary code via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" adv="1">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-3646" seq="2008-3646" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-10">
+ <desc>
+ <descript source="cve">The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible when mail is sent from a local command-line tool, which allows remote attackers to send mail to local Mac OS X users.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-3647" seq="2008-3647" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Buffer overflow in PSNormalizer in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a PostScript file with a crafted bounding box comment.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4211" seq="2008-4211" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Integer signedness error in QuickLook in Mac OS X 10.5.5 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.5.5" />
+ </prod>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4212" seq="2008-4212" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in rlogind in the rlogin component in Mac OS X 10.4.11 and 10.5.5 applies hosts.equiv entries to root despite what is stated in documentation, which might allow remote attackers to bypass intended access restrictions.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" adv="1">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="4.6" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="6.4" name="CVE-2008-4214" seq="2008-4214" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="4.6" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in Script Editor in Mac OS X 10.4.11 and 10.5.5 allows local users to cause the scripting dictionary to be written to arbitrary locations, related to an "insecure file operation" on temporary files.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.4.11" />
+ <vers num="10.5.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4215" seq="2008-4215" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Weblog in Mac OS X Server 10.4.11 does not properly check an error condition when a weblog posting access control list is specified for a user that has multiple short names, which might allow attackers to bypass intended access restrictions.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31681">31681</ref>
+ <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" adv="1">APPLE-SA-2008-10-09</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="mac_os_x_server">
+ <vers num="10.4.11" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="6.9" CVSS_exploit_subscore="3.4" CVSS_impact_subscore="10.0" name="CVE-2008-4394" seq="2008-4394" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="6.9" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <local />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31670">31670</ref>
+ <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200810-02.xml">GLSA-200810-02</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="gentoo" name="portage">
+ <vers edition="r3" num="2.0.51.22" />
+ <vers edition="r2" num="2.1.1" />
+ <vers num="2.1.3.10" />
+ <vers num="2.1.4.4" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4533" seq="2008-4533" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in Kantan WEB Server 1.8 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
+ </desc>
+ <sols>
+ <sol source="nvd">Patch Information - http://unyora.sakura.ne.jp/soft/EasyHTTPServer/index.html</sol>
+ </sols>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31244">31244</ref>
+ <ref source="OSVDB" url="http://www.osvdb.org/48222">48222</ref>
+ <ref source="JVNDB" url="http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000060.html">JVNDB-2008-000060</ref>
+ <ref source="JVN" url="http://jvn.jp/en/jp/JVN94163107/index.html">JVN#94163107</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="katan" name="web_server">
+ <vers num="1.6" />
+ <vers num="1.8" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4534" seq="2008-4534" severity="High" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-10">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in EC-CUBE Ver2 2.1.2a and earlier, and Ver2 RC 2.3.0-rc1 and earlier, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" patch="1" url="http://www.ec-cube.net/info/080829">http://www.ec-cube.net/info/080829</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32065" adv="1">32065</ref>
+ <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000065.html">JVNDB-2008-000065</ref>
+ <ref source="JVN" url="http://jvn.jp/en/jp/JVN81111541/index.html">JVN#81111541</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ec-cube" name="ec-cube">
+ <vers num="1.0" />
+ <vers num="1.4.7" />
+ <vers edition="b2" num="1.5.0" />
+ <vers num="2.1.2a" prev="1" />
+ <vers num="2.3.0" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4535" seq="2008-4535" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in EC-CUBE Ver2 2.1.2a and earlier, EC-CUBE Ver2 Beta(RC) 2.2.0-beta and earlier, and EC-CUBE Community Edition Nighly-Build r17623 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-4536 and CVE-2008-4537.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MISC" patch="1" url="http://www.ec-cube.net/release/detail.php?release_id=193" adv="1">http://www.ec-cube.net/release/detail.php?release_id=193</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32065">32065</ref>
+ <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000064.html">JVNDB-2008-000064</ref>
+ <ref source="JVN" url="http://jvn.jp/en/jp/JVN99916563/index.html">JVN#99916563</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ec-cube" name="ec-cube">
+ <vers num="1.0" />
+ <vers num="1.4.7" />
+ <vers edition="b2" num="1.5.0" />
+ <vers num="2.1.2a" prev="1" />
+ <vers num="2.3.0" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4536" seq="2008-4536" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in EC-CUBE Ver1 1.4.6 and earlier, Ver1 Beta 1.5.0-beta and earlier, Ver2 2.1.2a and earlier, Ver2 Beta(RC) 2.2.0-beta and earlier, Community Edition 1.3.4 and earlier, and Community Edition Nightly-Build r17319 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-4535 and CVE-2008-4537.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MISC" patch="1" url="http://www.ec-cube.net/release/detail.php?release_id=193" adv="1">http://www.ec-cube.net/release/detail.php?release_id=193</ref>
+ <ref source="SECUNIA" patch="1" url="http://secunia.com/advisories/32065" adv="1">32065</ref>
+ <ref source="JVN" url="http://jvn.jp/en/jp/JVN36085487/index.html">JVN#36085487</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ec-cube" name="ec-cube">
+ <vers num="1.0" />
+ <vers edition="unknown" num="1.3.4" prev="1" />
+ <vers edition="unknown:community_edition" num="1.3.4" prev="1" />
+ <vers num="1.4.7" />
+ <vers edition="b2" num="1.5.0" />
+ <vers num="2.1.2a" prev="1" />
+ <vers num="2.3.0" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4537" seq="2008-4537" severity="Medium" type="CVE" published="2008-10-10" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-10">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in EC-CUBE Ver1 1.4.6 and earlier, Ver1 Beta 1.5.0-beta and earlier, Ver2 2.1.2a and earlier, Ver2 Beta(RC) 2.1.1-beta and earlier, Community Edition 1.3.4 and earlier, and Community Edition Nightly-Build r17336 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-4535 and CVE-2008-4536.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MISC" patch="1" url="http://www.ec-cube.net/release/detail.php?release_id=193" adv="1">http://www.ec-cube.net/release/detail.php?release_id=193</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32065" adv="1">32065</ref>
+ <ref source="JVNDB" url="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000062.html">JVNDB-2008-000062</ref>
+ <ref source="JVN" url="http://jvn.jp/en/jp/JVN26621646/index.html">JVN#26621646</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ec-cube" name="ec-cube">
+ <vers num="1.0" />
+ <vers edition="unknown" num="1.3.4" prev="1" />
+ <vers edition="unknown:community_edition" num="1.3.4" prev="1" />
+ <vers num="1.4.7" />
+ <vers edition="b2" num="1.5.0" />
+ <vers num="2.1.2a" prev="1" />
+ <vers num="2.3.0" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-3271" seq="2008-3271" severity="Medium" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">https://issues.apache.org/bugzilla/show_bug.cgi?id=25835</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31698">31698</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497220/100/0/threaded">20081009 [SECURITY] CVE-2008-3271 - Apache Tomcat information disclosure</ref>
+ <ref source="CONFIRM" url="http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html">http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html</ref>
+ <ref source="CONFIRM" url="http://tomcat.apache.org/security-5.html">http://tomcat.apache.org/security-5.html</ref>
+ <ref source="CONFIRM" url="http://tomcat.apache.org/security-4.html" adv="1">http://tomcat.apache.org/security-4.html</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32234" adv="1">32234</ref>
+ <ref source="JVN" url="http://jvn.jp/en/jp/JVN30732239/index.html">JVN#30732239</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apache" name="tomcat">
+ <vers num="4.1.0" />
+ <vers num="4.1.1" />
+ <vers num="4.1.10" />
+ <vers num="4.1.11" />
+ <vers num="4.1.12" />
+ <vers num="4.1.13" />
+ <vers num="4.1.14" />
+ <vers num="4.1.15" />
+ <vers num="4.1.16" />
+ <vers num="4.1.17" />
+ <vers num="4.1.18" />
+ <vers num="4.1.19" />
+ <vers num="4.1.2" />
+ <vers num="4.1.20" />
+ <vers num="4.1.21" />
+ <vers num="4.1.22" />
+ <vers num="4.1.23" />
+ <vers num="4.1.24" />
+ <vers num="4.1.25" />
+ <vers num="4.1.26" />
+ <vers num="4.1.27" />
+ <vers num="4.1.28" />
+ <vers num="4.1.29" />
+ <vers edition="beta" num="4.1.3" />
+ <vers num="4.1.30" />
+ <vers num="4.1.31" />
+ <vers num="4.1.4" />
+ <vers num="4.1.5" />
+ <vers num="4.1.6" />
+ <vers num="4.1.7" />
+ <vers num="4.1.8" />
+ <vers num="4.1.9" />
+ <vers num="5.5.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:C)" CVSS_base_score="9.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="8.5" name="CVE-2008-3544" seq="2008-3544" severity="High" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="9.0" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Multiple stack-based buffer overflows in ovalarmsrv in HP OpenView Network Node Manager (OV NNM) 7.51, and possibly 7.01, 7.50, and 7.53, allow remote attackers to execute arbitrary code via a long (1) REQUEST_SEV_CHANGE (aka number 47), (2) REQUEST_SAVE_STATE (aka number 61), or (3) REQUEST_RESTORE_STATE (aka number 62) request to TCP port 2954.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="HP" patch="1" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01537275" adv="1">SSRT080042</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/28668">28668</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/490541">20080407 Multiple vulnerabilities in HP OpenView NNM 7.53</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/31688" adv="1">31688</ref>
+ <ref source="MISC" url="http://downloads.securityfocus.com/vulnerabilities/exploits/28668.c">http://downloads.securityfocus.com/vulnerabilities/exploits/28668.c</ref>
+ <ref source="MISC" url="http://aluigi.altervista.org/adv/closedview_old-adv.txt">http://aluigi.altervista.org/adv/closedview_old-adv.txt</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="hp" name="openview_network_node_manager">
+ <vers num="7.01" />
+ <vers num="7.50" />
+ <vers num="7.51" />
+ <vers num="7.53" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)" CVSS_base_score="7.8" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.9" name="CVE-2008-3545" seq="2008-3545" severity="High" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="7.8" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in ovtopmd in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2008-3536, CVE-2008-3537, and CVE-2008-3544. NOTE: due to insufficient details from the vendor, it is not clear whether this is the same as CVE-2008-1853.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="HP" patch="1" url="http://marc.info/?l=bugtraq&amp;m=122356907004075&amp;w=2">SSRT080046</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31669">31669</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021014">1021014</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/29796" adv="1">29796</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="hp" name="openview_network_node_manager">
+ <vers num="7.01" />
+ <vers num="7.51" />
+ <vers num="7.53" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4411" seq="2008-4411" severity="Medium" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-13">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 2.1.15.210 on Linux and Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2008-1663.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31663">31663</ref>
+ <ref source="FRSIRT" patch="1" url="http://www.frsirt.com/english/advisories/2008/2778" adv="1">ADV-2008-2778</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021015">1021015</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32199" adv="1">32199</ref>
+ <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=122356588429626&amp;w=2">HPSBMA02376</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="hp" name="system_management_homepage">
+ <vers num="2.0.0" />
+ <vers num="2.0.1" />
+ <vers num="2.0.2" />
+ <vers num="2.1" />
+ <vers num="2.1.0-103" />
+ <vers num="2.1.0-103(a)" />
+ <vers num="2.1.0-109" />
+ <vers num="2.1.0-118" />
+ <vers num="2.1.1" />
+ <vers num="2.1.10" />
+ <vers num="2.1.10-186" />
+ <vers num="2.1.11" />
+ <vers num="2.1.11-197" />
+ <vers num="2.1.12-118" />
+ <vers num="2.1.12-200" prev="1" />
+ <vers num="2.1.2" />
+ <vers num="2.1.2-127" />
+ <vers num="2.1.3" />
+ <vers num="2.1.3.132" />
+ <vers num="2.1.4" />
+ <vers num="2.1.4-143" />
+ <vers num="2.1.5" />
+ <vers num="2.1.5-146" />
+ <vers num="2.1.6" />
+ <vers num="2.1.6-156" />
+ <vers num="2.1.7" />
+ <vers num="2.1.7-168" />
+ <vers num="2.1.8" />
+ <vers num="2.1.8-177" />
+ <vers num="2.1.9" />
+ <vers num="2.1.9-178" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)" CVSS_base_score="2.1" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="2.9" name="CVE-2008-4540" seq="2008-4540" severity="Low" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="2.1" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Windows Mobile 6 on the HTC Hermes device makes WLAN passwords available to an auto-completion mechanism for the password input field, which allows physically proximate attackers to bypass password authentication and obtain WLAN access.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497151/100/0/threaded">20081008 Windows Mobile 6 insecure password handling and too short WLAN-password</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_mobile">
+ <vers num="6.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4541" seq="2008-4541" severity="High" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via unspecified vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45782">sun-webproxy-ftp-bo(45782)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31691">31691</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2781" adv="1">ADV-2008-2781</ref>
+ <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1">242986</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021038">1021038</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32227" adv="1">32227</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="sun" name="java_system_web_proxy_server">
+ <vers edition="sp1" num="4.0" />
+ <vers edition="sp1" num="4.0.1" />
+ <vers edition="sp2" num="4.0.1" />
+ <vers edition="sp3" num="4.0.1" />
+ <vers edition="sp4" num="4.0.1" />
+ <vers edition="sp5" num="4.0.1" />
+ <vers edition="sp6" num="4.0.1" />
+ <vers edition="sp1" num="4.0.2" />
+ <vers edition="sp2" num="4.0.2" />
+ <vers edition="sp3" num="4.0.2" />
+ <vers edition="sp4" num="4.0.2" />
+ <vers edition="sp5" num="4.0.2" />
+ <vers edition="sp6" num="4.0.2" />
+ <vers edition="sp1" num="4.0.3" />
+ <vers edition="sp2" num="4.0.3" />
+ <vers edition="sp3" num="4.0.3" />
+ <vers edition="sp4" num="4.0.3" />
+ <vers edition="sp5" num="4.0.3" />
+ <vers edition="sp6" num="4.0.3" />
+ <vers edition="sp1" num="4.0.4" />
+ <vers edition="sp2" num="4.0.4" />
+ <vers edition="sp3" num="4.0.4" />
+ <vers edition="sp4" num="4.0.4" />
+ <vers edition="sp5" num="4.0.4" />
+ <vers edition="sp6" num="4.0.4" />
+ <vers edition="sp1" num="4.0.5" />
+ <vers edition="sp2" num="4.0.5" />
+ <vers edition="sp3" num="4.0.5" />
+ <vers edition="sp4" num="4.0.5" />
+ <vers edition="sp5" num="4.0.5" />
+ <vers edition="sp6" num="4.0.5" />
+ <vers edition="" num="4.0.6" />
+ <vers edition=":windows" num="4.0.6" />
+ <vers edition=":x86" num="4.0.6" />
+ <vers edition=":hp_ux" num="4.0.6" />
+ <vers edition=":sparc" num="4.0.6" />
+ <vers edition=":linux" num="4.0.6" />
+ <vers edition="" num="4.0.7" />
+ <vers edition=":sparc" num="4.0.7" />
+ <vers edition=":windows" num="4.0.7" />
+ <vers edition=":x86" num="4.0.7" />
+ <vers edition=":hp_ux" num="4.0.7" />
+ <vers edition=":linux" num="4.0.7" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)" CVSS_base_score="3.5" CVSS_exploit_subscore="6.8" CVSS_impact_subscore="2.9" name="CVE-2008-4542" seq="2008-4542" severity="Low" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="3.5" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in Cisco Unity 4.x before 4.2(1)ES162, 5.x before 5.0(1)ES56, and 7.x before 7.0(2)ES8 allows remote authenticated administrators to inject arbitrary web script or HTML by entering it in the database (aka data store).</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MISC" url="http://www.voipshield.com/research-details.php?id=127">http://www.voipshield.com/research-details.php?id=127</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31642">31642</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2771" adv="1">ADV-2008-2771</ref>
+ <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html" adv="1">20081008 VoIPshield Reported Vulnerabilities in Cisco Unity Server</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021012">1021012</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32207" adv="1">32207</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="cisco" name="unity">
+ <vers num="4.0" />
+ <vers num="4.0(1)" />
+ <vers num="4.0(2)" />
+ <vers edition="sr2" num="4.0(3)" />
+ <vers edition="sr1" num="4.0(4)" />
+ <vers num="4.0(5)" />
+ <vers num="4.1(1)" />
+ <vers num="4.2(1)" prev="1" />
+ <vers num="5.0" />
+ <vers num="5.0(1)" prev="1" />
+ <vers num="7.0" />
+ <vers num="7.0(2)" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)" CVSS_base_score="7.1" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.9" name="CVE-2008-4543" seq="2008-4543" severity="High" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="7.1" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8, when using anonymous authentication (aka native Unity authentication), allows remote attackers to cause a denial of service (session exhaustion) via a large number of connections.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MISC" url="http://www.voipshield.com/research-details.php?id=128">http://www.voipshield.com/research-details.php?id=128</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31642">31642</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2771" adv="1">ADV-2008-2771</ref>
+ <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html" adv="1">20081008 VoIPshield Reported Vulnerabilities in Cisco Unity Server</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021013">1021013</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32187" adv="1">32187</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="cisco" name="unity">
+ <vers num="4.0" />
+ <vers num="4.0(1)" />
+ <vers num="4.0(2)" />
+ <vers edition="sr2" num="4.0(3)" />
+ <vers edition="sr1" num="4.0(4)" />
+ <vers num="4.0(5)" />
+ <vers num="4.1(1)" />
+ <vers num="4.2(1)" prev="1" />
+ <vers num="5.0" />
+ <vers num="5.0(1)" prev="1" />
+ <vers num="7.0" />
+ <vers num="7.0(2)" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4544" seq="2008-4544" severity="Medium" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in an unspecified Microsoft API, as used by Cisco Unity and possibly other products, allows remote attackers to cause a denial of service by sending crafted packets to dynamic UDP ports, related to a "processing error."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MISC" url="http://www.voipshield.com/research-details.php?id=129">http://www.voipshield.com/research-details.php?id=129</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31642">31642</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2771" adv="1">ADV-2008-2771</ref>
+ <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html" adv="1">20081008 VoIPshield Reported Vulnerabilities in Cisco Unity Server</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021020">1021020</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="cisco" name="unity">
+ <vers num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)" CVSS_base_score="4.0" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="2.9" name="CVE-2008-4545" seq="2008-4545" severity="Medium" type="CVE" published="2008-10-13" CVSS_version="2.0" CVSS_score="4.0" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8 uses weak permissions for the D:\CommServer\Reports directory, which allows remote authenticated users to obtain sensitive information by reading files in this directory.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MISC" url="http://www.voipshield.com/research-details.php?id=130">http://www.voipshield.com/research-details.php?id=130</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31642">31642</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2771" adv="1">ADV-2008-2771</ref>
+ <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html" adv="1">20081008 VoIPshield Reported Vulnerabilities in Cisco Unity Server</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021022">1021022</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32187" adv="1">32187</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="cisco" name="unity">
+ <vers num="4.0" />
+ <vers num="4.0(1)" />
+ <vers num="4.0(2)" />
+ <vers edition="sr2" num="4.0(3)" />
+ <vers edition="sr1" num="4.0(4)" />
+ <vers num="4.0(5)" />
+ <vers num="4.1(1)" />
+ <vers num="4.2(1)" prev="1" />
+ <vers num="5.0" />
+ <vers num="5.0(1)" prev="1" />
+ <vers num="7.0" />
+ <vers num="7.0(2)" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)" CVSS_base_score="7.8" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.9" name="CVE-2008-4441" seq="2008-4441" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.8" modified="2008-10-17">
+ <desc>
+ <descript source="cve">The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45841">linksys-wap4400n-request-dos(45841)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31742">31742</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497285/100/0/threaded">20081013 Marvell Driver Malformed Association Request Vulnerability</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2805">ADV-2008-2805</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32259">32259</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="linksys" name="wap400n">
+ <vers num="1.2.14" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4546" seq="2008-4546" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-14">
+ <desc>
+ <descript source="cve">Adobe Flash Player 9.0.45.0, 9.0.112.0, 9.0.124.0, and 10.0.12.10 allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/496929/100/0/threaded">20081002 Adobe Flash Player plug-in null pointer dereference and browser crash</ref>
+ <ref source="MISC" url="http://www.mochimedia.com/~matthew/flashcrash/">http://www.mochimedia.com/~matthew/flashcrash/</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="adobe" name="flash_player">
+ <vers num="10.0.12.10" />
+ <vers num="9.0.112.0" />
+ <vers num="9.0.115.0" />
+ <vers num="9.0.45.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-4547" seq="2008-4547" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in the PdvrAtl.PdvrOcx.1 ActiveX control (pdvratl.dll) in DVRHOST Web CMS OCX 1.0.1.25 allows remote attackers to execute arbitrary code via a long second argument to the TimeSpanFormat method.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/39640">dvrhost-pdvrocx-bo(39640)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27267">27267</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/4903">4903</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/28443" adv="1">28443</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="dvrhost" name="web_cms">
+ <vers num="1.0.1.25" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-4548" seq="2008-4548" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Stack-based buffer overflow in the PTZCamPanelCtrl ActiveX control (CamPanel.dll) in RTS Sentry 2.1.0.2 allows remote attackers to execute arbitrary code via a long second argument to the ConnectServer method.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/39725">rtssentry-ptzcampanelctrl-bo(39725)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27304">27304</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/4918">4918</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/28435" adv="1">28435</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="rtssentry" name="rtssentry">
+ <vers num="2.1.0.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)" CVSS_base_score="2.6" CVSS_exploit_subscore="4.9" CVSS_impact_subscore="2.9" name="CVE-2008-4549" seq="2008-4549" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="2.6" modified="2008-10-15">
+ <desc>
+ <descript source="cve">The ImageShack Toolbar ActiveX control (ImageShackToolbar.dll) in ImageShack Toolbar 4.5.7, possibly including 4.5.7.69, allows remote attackers to force the upload of arbitrary image files to the ImageShack site via a file: URI argument to the BuildSlideShow method.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/39921">toolbar-imageshacktoolbar-info-disclosure(39921)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27439">27439</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/486941/100/200/threaded">20080124 ImageShack Toolbar FileUploader Class insecurities</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/4981">4981</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/28644" adv="1">28644</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="imageshack" name="imageshack_toolbar">
+ <vers num="4.5.7" />
+ <vers num="4.5.7.69" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4551" seq="2008-4551" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">strongSwan 4.2.6 and earlier allows remote attackers to cause a denial of service (daemon crash) via an IKE_SA_INIT message with a large number of NULL values in a Key Exchange payload, which triggers a NULL pointer dereference for the return value of the mpz_export function in the GNU Multiprecision Library (GMP).</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="SECTRACK" url="http://www.securitytracker.com/id?1020903">1020903</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31291">31291</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2660" adv="1">ADV-2008-2660</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/31963" adv="1">31963</ref>
+ <ref source="MISC" url="http://labs.mudynamics.com/advisories/MU-200809-01.txt">http://labs.mudynamics.com/advisories/MU-200809-01.txt</ref>
+ <ref source="CONFIRM" url="http://download.strongswan.org/CHANGES4.txt">http://download.strongswan.org/CHANGES4.txt</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="strongswan" name="strongswan">
+ <vers num="2.0.0" />
+ <vers num="2.0.1" />
+ <vers num="2.0.2" />
+ <vers num="2.1.0" />
+ <vers num="2.1.1" />
+ <vers num="2.1.2" />
+ <vers num="2.1.3" />
+ <vers num="2.1.4" />
+ <vers num="2.1.5" />
+ <vers num="2.2.0" />
+ <vers num="2.2.1" />
+ <vers num="2.2.2" />
+ <vers num="2.3.0" />
+ <vers num="2.3.1" />
+ <vers num="2.3.2" />
+ <vers num="2.4.0" />
+ <vers num="2.4.0a" />
+ <vers num="2.4.1" />
+ <vers num="2.4.2" />
+ <vers num="2.4.3" />
+ <vers num="2.5.0" />
+ <vers num="2.5.1" />
+ <vers num="2.5.2" />
+ <vers num="2.5.3" />
+ <vers num="2.5.4" />
+ <vers num="2.5.5" />
+ <vers num="2.5.6" />
+ <vers num="2.5.7" />
+ <vers num="2.6.0" />
+ <vers num="2.6.1" />
+ <vers num="2.6.2" />
+ <vers num="2.6.3" />
+ <vers num="2.6.4" />
+ <vers num="2.7.0" />
+ <vers num="4.0.0" />
+ <vers num="4.0.1" />
+ <vers num="4.0.2" />
+ <vers num="4.0.3" />
+ <vers num="4.0.4" />
+ <vers num="4.0.5" />
+ <vers num="4.0.6" />
+ <vers num="4.0.7" />
+ <vers num="4.1.0" />
+ <vers num="4.1.1" />
+ <vers num="4.1.10" />
+ <vers num="4.1.11" />
+ <vers num="4.1.2" />
+ <vers num="4.1.3" />
+ <vers num="4.1.4" />
+ <vers num="4.1.5" />
+ <vers num="4.1.6" />
+ <vers num="4.1.7" />
+ <vers num="4.1.8" />
+ <vers num="4.1.9" />
+ <vers num="4.2.0" />
+ <vers num="4.2.1" />
+ <vers num="4.2.2" />
+ <vers num="4.2.3" />
+ <vers num="4.2.4" />
+ <vers num="4.2.5" />
+ <vers num="4.2.6" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4552" seq="2008-4552" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">nfs-utils 1.0.9, and possibly other versions before 1.1.3, invokes the host_ctl function with the wrong order of arguments, which causes TCP Wrappers to ignore netgroups and allows remote attackers to bypass intended access restrictions.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=458676">https://bugzilla.redhat.com/show_bug.cgi?id=458676</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="nfs" name="nfs-utils">
+ <vers num="0.2" />
+ <vers num="0.2.1" />
+ <vers num="0.3.1" />
+ <vers num="0.3.3" />
+ <vers num="1.0" />
+ <vers num="1.0.1" />
+ <vers num="1.0.10" />
+ <vers num="1.0.11" />
+ <vers num="1.0.12" />
+ <vers num="1.0.2" />
+ <vers num="1.0.3" />
+ <vers num="1.0.4" />
+ <vers num="1.0.6" />
+ <vers edition="pre-1" num="1.0.7" />
+ <vers edition="pre-2" num="1.0.7" />
+ <vers edition="rc-1" num="1.0.8" />
+ <vers edition="rc-2" num="1.0.8" />
+ <vers edition="rc-3" num="1.0.8" />
+ <vers edition="rc-4" num="1.0.8" />
+ <vers num="1.0.9" />
+ <vers edition="rc-1" num="1.1.0" />
+ <vers num="1.1.1" />
+ <vers num="1.1.2" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-3639" seq="2008-3639" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021033">1021033</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31690">31690</ref>
+ <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0937.html">RHSA-2008:0937</ref>
+ <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:211">MDVSA-2008:211</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2782" adv="1">ADV-2008-2782</ref>
+ <ref source="CONFIRM" url="http://www.cups.org/str.php?L2918" adv="1">http://www.cups.org/str.php?L2918</ref>
+ <ref source="CONFIRM" url="http://www.cups.org/articles.php?L575">http://www.cups.org/articles.php?L575</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32226" adv="1">32226</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32084" adv="1">32084</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="cups">
+ <vers num="1.1" />
+ <vers num="1.1.1" />
+ <vers num="1.1.10" />
+ <vers num="1.1.10-1" />
+ <vers num="1.1.11" />
+ <vers num="1.1.12" />
+ <vers num="1.1.13" />
+ <vers num="1.1.14" />
+ <vers num="1.1.15" />
+ <vers num="1.1.16" />
+ <vers num="1.1.17" />
+ <vers num="1.1.18" />
+ <vers edition="rc1" num="1.1.19" />
+ <vers edition="rc2" num="1.1.19" />
+ <vers edition="rc3" num="1.1.19" />
+ <vers edition="rc4" num="1.1.19" />
+ <vers edition="rc5" num="1.1.19" />
+ <vers num="1.1.2" />
+ <vers edition="rc1" num="1.1.20" />
+ <vers edition="rc2" num="1.1.20" />
+ <vers edition="rc3" num="1.1.20" />
+ <vers edition="rc4" num="1.1.20" />
+ <vers edition="rc5" num="1.1.20" />
+ <vers edition="rc6" num="1.1.20" />
+ <vers edition="rc1" num="1.1.21" />
+ <vers edition="rc2" num="1.1.21" />
+ <vers edition="rc1" num="1.1.22" />
+ <vers edition="rc2" num="1.1.22" />
+ <vers edition="rc1" num="1.1.23" />
+ <vers num="1.1.3" />
+ <vers num="1.1.4" />
+ <vers num="1.1.5" />
+ <vers num="1.1.5-1" />
+ <vers num="1.1.5-2" />
+ <vers num="1.1.6" />
+ <vers num="1.1.6-1" />
+ <vers num="1.1.6-2" />
+ <vers num="1.1.6-3" />
+ <vers num="1.1.7" />
+ <vers num="1.1.8" />
+ <vers num="1.1.9" />
+ <vers num="1.1.9-1" />
+ <vers edition="b1" num="1.2" />
+ <vers edition="b2" num="1.2" />
+ <vers edition="rc1" num="1.2" />
+ <vers edition="rc2" num="1.2" />
+ <vers edition="rc3" num="1.2" />
+ <vers num="1.2.0" />
+ <vers num="1.2.1" />
+ <vers num="1.2.10" />
+ <vers num="1.2.11" />
+ <vers num="1.2.12" />
+ <vers num="1.2.2" />
+ <vers num="1.2.3" />
+ <vers num="1.2.4" />
+ <vers num="1.2.5" />
+ <vers num="1.2.6" />
+ <vers num="1.2.7" />
+ <vers num="1.2.8" />
+ <vers num="1.2.9" />
+ <vers edition="b1" num="1.3" />
+ <vers edition="rc1" num="1.3" />
+ <vers edition="rc2" num="1.3" />
+ <vers num="1.3.0" />
+ <vers num="1.3.1" />
+ <vers num="1.3.2" />
+ <vers num="1.3.3" />
+ <vers num="1.3.4" />
+ <vers num="1.3.5" />
+ <vers num="1.3.6" />
+ <vers num="1.3.7" />
+ <vers num="1.3.8" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-3640" seq="2008-3640" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Integer overflow in the WriteProlog function in texttops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021034">1021034</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31690">31690</ref>
+ <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0937.html">RHSA-2008:0937</ref>
+ <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:211">MDVSA-2008:211</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2782" adv="1">ADV-2008-2782</ref>
+ <ref source="CONFIRM" url="http://www.cups.org/str.php?L2919">http://www.cups.org/str.php?L2919</ref>
+ <ref source="CONFIRM" url="http://www.cups.org/articles.php?L575">http://www.cups.org/articles.php?L575</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32226" adv="1">32226</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32084" adv="1">32084</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="apple" name="cups">
+ <vers num="1.1" />
+ <vers num="1.1.1" />
+ <vers num="1.1.10" />
+ <vers num="1.1.10-1" />
+ <vers num="1.1.11" />
+ <vers num="1.1.12" />
+ <vers num="1.1.13" />
+ <vers num="1.1.14" />
+ <vers num="1.1.15" />
+ <vers num="1.1.16" />
+ <vers num="1.1.17" />
+ <vers num="1.1.18" />
+ <vers edition="rc1" num="1.1.19" />
+ <vers edition="rc2" num="1.1.19" />
+ <vers edition="rc3" num="1.1.19" />
+ <vers edition="rc4" num="1.1.19" />
+ <vers edition="rc5" num="1.1.19" />
+ <vers num="1.1.2" />
+ <vers edition="rc1" num="1.1.20" />
+ <vers edition="rc2" num="1.1.20" />
+ <vers edition="rc3" num="1.1.20" />
+ <vers edition="rc4" num="1.1.20" />
+ <vers edition="rc5" num="1.1.20" />
+ <vers edition="rc6" num="1.1.20" />
+ <vers edition="rc1" num="1.1.21" />
+ <vers edition="rc2" num="1.1.21" />
+ <vers edition="rc1" num="1.1.22" />
+ <vers edition="rc2" num="1.1.22" />
+ <vers edition="rc1" num="1.1.23" />
+ <vers num="1.1.3" />
+ <vers num="1.1.4" />
+ <vers num="1.1.5" />
+ <vers num="1.1.5-1" />
+ <vers num="1.1.5-2" />
+ <vers num="1.1.6" />
+ <vers num="1.1.6-1" />
+ <vers num="1.1.6-2" />
+ <vers num="1.1.6-3" />
+ <vers num="1.1.7" />
+ <vers num="1.1.8" />
+ <vers num="1.1.9" />
+ <vers num="1.1.9-1" />
+ <vers edition="b1" num="1.2" />
+ <vers edition="b2" num="1.2" />
+ <vers edition="rc1" num="1.2" />
+ <vers edition="rc2" num="1.2" />
+ <vers edition="rc3" num="1.2" />
+ <vers num="1.2.0" />
+ <vers num="1.2.1" />
+ <vers num="1.2.10" />
+ <vers num="1.2.11" />
+ <vers num="1.2.12" />
+ <vers num="1.2.2" />
+ <vers num="1.2.3" />
+ <vers num="1.2.4" />
+ <vers num="1.2.5" />
+ <vers num="1.2.6" />
+ <vers num="1.2.7" />
+ <vers num="1.2.8" />
+ <vers num="1.2.9" />
+ <vers edition="b1" num="1.3" />
+ <vers edition="rc1" num="1.3" />
+ <vers edition="rc2" num="1.3" />
+ <vers num="1.3.0" />
+ <vers num="1.3.1" />
+ <vers num="1.3.2" />
+ <vers num="1.3.3" />
+ <vers num="1.3.4" />
+ <vers num="1.3.5" />
+ <vers num="1.3.6" />
+ <vers num="1.3.7" />
+ <vers num="1.3.8" prev="1" />
+ </prod>
+ <prod vendor="cups" name="cups">
+ <vers num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-4385" seq="2008-4385" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Husdawg, LLC Systems Requirements Lab 3 allows remote attackers to force the download and execution of arbitrary programs via unknown vectors in (1) ActiveX control (sysreqlab.dll, sysreqlabsli.dll, or sysreqlab2.dll) and (2) Java applet in RLApplet.class in sysreqlab2.jar or sysreqlab.jar.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/166651" adv="1">VU#166651</ref>
+ <ref source="CONFIRM" url="http://www.systemrequirementslab.com/bulletins/security_bulletin_1.html" adv="1">http://www.systemrequirementslab.com/bulletins/security_bulletin_1.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="systemrequirementslab" name="system_requirements_lab">
+ <vers num="3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4397" seq="2008-4397" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Directory traversal vulnerability in the RPC interface (asdbapi.dll) in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to execute arbitrary commands via a .. (dot dot) in an RPC call with opnum 0x10A.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" patch="1" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143" adv="1">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497281/100/0/threaded">20081011 CA BrightStor ARCServe BackUp Message Engine Remote Command Injection Vulnerability</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ca" name="arcserve_backup">
+ <vers num="r11.1" />
+ <vers num="r11.5" />
+ <vers num="r12.0" />
+ </prod>
+ <prod vendor="ca" name="business_protection_suite">
+ <vers edition="" num="r2" />
+ <vers edition=":microsoft_small_business_server_premium" num="r2" />
+ <vers edition=":microsoft_small_business_server_standard" num="r2" />
+ </prod>
+ <prod vendor="ca" name="server_protection_suite">
+ <vers num="r2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4398" seq="2008-4398" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the tape engine service in asdbapi.dll in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to cause a denial of service (crash) via a crafted request.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143" adv="1">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ca" name="arcserve_backup">
+ <vers num="r11.1" />
+ <vers num="r11.5" />
+ <vers num="r12.0" />
+ </prod>
+ <prod vendor="ca" name="business_protection_suite">
+ <vers edition="" num="r2" />
+ <vers edition=":microsoft_small_business_server_premium" num="r2" />
+ <vers edition=":microsoft_small_business_server_standard" num="r2" />
+ </prod>
+ <prod vendor="ca" name="server_protection_suite">
+ <vers num="r2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4399" seq="2008-4399" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the database engine service in asdbapi.dll in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to cause a denial of service (crash) via a crafted request, related to "insufficient validation."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" patch="1" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143" adv="1">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ca" name="arcserve_backup">
+ <vers num="r11.1" />
+ <vers num="r11.5" />
+ <vers num="r12.0" />
+ </prod>
+ <prod vendor="ca" name="business_protection_suite">
+ <vers edition="" num="r2" />
+ <vers edition=":microsoft_small_business_server_premium" num="r2" />
+ <vers edition=":microsoft_small_business_server_standard" num="r2" />
+ </prod>
+ <prod vendor="ca" name="server_protection_suite">
+ <vers num="r2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4400" seq="2008-4400" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in asdbapi.dll in CA ARCserve Backup (formerly BrightStor ARCserve Backup) r11.1 through r12.0 allows remote attackers to cause a denial of service (crash of multiple services) via crafted authentication credentials, related to "insufficient validation."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" patch="1" url="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143" adv="1">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=188143</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ca" name="arcserve_backup">
+ <vers num="r11.1" />
+ <vers num="r11.5" />
+ <vers num="r12.0" />
+ </prod>
+ <prod vendor="ca" name="business_protection_suite">
+ <vers edition="" num="r2" />
+ <vers edition=":microsoft_small_business_server_premium" num="r2" />
+ <vers edition=":microsoft_small_business_server_standard" num="r2" />
+ </prod>
+ <prod vendor="ca" name="server_protection_suite">
+ <vers num="r2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)" CVSS_base_score="8.5" CVSS_exploit_subscore="6.8" CVSS_impact_subscore="10.0" name="CVE-2008-4555" seq="2008-4555" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="8.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions, allows user-assisted remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a DOT file with a large number of Agraph_t elements.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31648">31648</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497150/100/0/threaded">20081008 Advisory: Graphviz Buffer Overflow Code Execution</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32186" adv="1">32186</ref>
+ <ref source="MISC" url="http://roeehay.blogspot.com/2008/10/graphviz-buffer-overflow-code-execution.html">http://roeehay.blogspot.com/2008/10/graphviz-buffer-overflow-code-execution.html</ref>
+ <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=240636">http://bugs.gentoo.org/show_bug.cgi?id=240636</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="graphviz" name="graphviz">
+ <vers num="1.10_2003-09-15_0415_1" />
+ <vers num="1.10_2003-09-15_0415_2" />
+ <vers num="1.12.1" />
+ <vers num="1.12.2" />
+ <vers num="1.12.3" />
+ <vers num="1.14.1" />
+ <vers num="1.16.1" />
+ <vers num="1.5.1" />
+ <vers num="1.5.2" />
+ <vers num="1.5.3" />
+ <vers num="1.7.16.1" />
+ <vers num="1.7.16.2" />
+ <vers num="1.7.5.1" />
+ <vers num="1.7.5.2" />
+ <vers num="1.7.5.3" />
+ <vers num="1.7.5.4" />
+ <vers num="1.7.5.5" />
+ <vers num="1.7.5.6" />
+ <vers num="1.7.5.7" />
+ <vers num="1.7.5_0.1" />
+ <vers num="1.7.5_0.2" />
+ <vers num="1.7.5_0.3" />
+ <vers num="1.8.5.1" />
+ <vers num="1.8.5.2" />
+ <vers num="1.8.9.1" />
+ <vers num="2.10" />
+ <vers num="2.12" />
+ <vers num="2.14" />
+ <vers num="2.16" />
+ <vers num="2.18" />
+ <vers num="2.2" />
+ <vers num="2.2.1" />
+ <vers num="2.2.1.1" />
+ <vers num="2.2.2" />
+ <vers num="2.20.0" />
+ <vers num="2.20.1" />
+ <vers num="2.20.2" prev="1" />
+ <vers num="2.4" />
+ <vers num="2.6" />
+ <vers num="2.8" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)" CVSS_base_score="2.1" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="2.9" name="CVE-2008-2588" seq="2008-2588" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="2.1" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle JDeveloper component in Oracle Application Server 10.1.2.2 allows local users to affect confidentiality via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="jdeveloper">
+ <vers num="10.1.2.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:S/C:N/I:N/A:P)" CVSS_base_score="1.7" CVSS_exploit_subscore="3.1" CVSS_impact_subscore="2.9" name="CVE-2008-2619" seq="2008-2619" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="1.7" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Reports Developer component in Oracle Application Server 1.0.2.2, 9.0.4.3, and 10.1.2.2, and E-Business Suite 11.5.10.2, allows remote authenticated users to affect availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="application_server">
+ <vers num="1.0.2.2" />
+ <vers num="10.1.2.2" />
+ <vers num="9.0.4.3" />
+ </prod>
+ <prod vendor="oracle" name="e-business_suite">
+ <vers num="11.5.10.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)" CVSS_base_score="6.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="6.4" name="CVE-2008-2624" seq="2008-2624" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="6.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle OLAP component in Oracle Database 10.1.0.5 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:N)" CVSS_base_score="4.0" CVSS_exploit_subscore="4.9" CVSS_impact_subscore="4.9" name="CVE-2008-2625" seq="2008-2625" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.2" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-3975" seq="2008-3975" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3 and 10.1.2.3 allows remote attackers to affect integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="application_server">
+ <vers num="10.1.2.3" />
+ <vers num="9.0.4.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3976" seq="2008-3976" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Spatial component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.3" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-3977" seq="2008-3977" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3 and 10.1.2.3 allows remote attackers to affect integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="application_server">
+ <vers num="10.1.2.3" />
+ <vers num="9.0.4.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:N)" CVSS_base_score="4.9" CVSS_exploit_subscore="6.8" CVSS_impact_subscore="4.9" name="CVE-2008-3980" seq="2008-3980" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.9" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Upgrade component in Oracle Database 10.1.0.5 and 10.2.0.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3982" seq="2008-3982" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.3" />
+ </prod>
+ <prod vendor="oracle" name="database_11i">
+ <vers num="11.1.0.6" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3983" seq="2008-3983" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.3" />
+ </prod>
+ <prod vendor="oracle" name="database_11i">
+ <vers num="11.1.0.6" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3984" seq="2008-3984" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.3" />
+ </prod>
+ <prod vendor="oracle" name="database_11i">
+ <vers num="11.1.0.6" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-3985" seq="2008-3985" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 12.0.4 allows remote attackers to affect confidentiality via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="e-business_suite">
+ <vers num="12.0.4" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:H/Au:S/C:P/I:N/A:N)" CVSS_base_score="1.0" CVSS_exploit_subscore="1.5" CVSS_impact_subscore="2.9" name="CVE-2008-3986" seq="2008-3986" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="1.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Discoverer Administrator component in Oracle Application Server 9.0.4.3 and 10.1.2.2 allows local users to affect confidentiality via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="application_server">
+ <vers num="10.1.2.2" />
+ <vers num="9.0.4.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:H/Au:S/C:P/I:N/A:N)" CVSS_base_score="1.0" CVSS_exploit_subscore="1.5" CVSS_impact_subscore="2.9" name="CVE-2008-3987" seq="2008-3987" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="1.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Discoverer Desktop component in Oracle Application Server 10.1.2.3 allows local users to affect confidentiality via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="application_server">
+ <vers num="10.1.2.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-3988" seq="2008-3988" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the iSupplier Portal component in Oracle E-Business Suite 11.5.10.2 and 12.0.4 allows remote attackers to affect confidentiality via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="e-business_suite">
+ <vers num="10.2" />
+ <vers num="11.5" />
+ <vers num="12.0.4" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)" CVSS_base_score="6.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="6.4" name="CVE-2008-3989" seq="2008-3989" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="6.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Data Mining component in Oracle Database 10.2.0.3 allows remote authenticated users to affect confidentiality, integrity, and availability, related to DMSYS.ODM_MODEL_UTIL.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.2.0.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)" CVSS_base_score="4.0" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="2.9" name="CVE-2008-3990" seq="2008-3990" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle OLAP component in Oracle Database 9.2.08, 9.2.0.8DV, and 10.1.0.5 allows remote authenticated users to affect availability, related to OLAPSYS.CWM2_OLAP_AW_AWUTIL.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)" CVSS_base_score="4.0" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="2.9" name="CVE-2008-3991" seq="2008-3991" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle OLAP component in Oracle Database 9.2.08, 9.2.0.8DV, and 10.1.0.5 allows remote authenticated users to affect availability, related to OLAPSYS.CWM2_OLAP_AW_AWUTIL.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3992" seq="2008-3992" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality and integrity, related to DMSYS.DBMS_DM_EXP_INTERNAL.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.2.0.4" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:P/A:N)" CVSS_base_score="3.5" CVSS_exploit_subscore="6.8" CVSS_impact_subscore="2.9" name="CVE-2008-3993" seq="2008-3993" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="3.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2 and 12.0.4 allows remote authenticated users to affect integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="e-business_suite">
+ <vers num="10.2" />
+ <vers num="11.5" />
+ <vers num="12.0.4" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3994" seq="2008-3994" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to WMSYS.LTADM.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.3" />
+ </prod>
+ <prod vendor="oracle" name="database_11i">
+ <vers num="11.1.0.6" />
+ </prod>
+ <prod vendor="oracle" name="database_9i">
+ <vers num="9.2.0.8" />
+ <vers num="9.2.0.8dv" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3995" seq="2008-3995" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_CDC_PUBLISH.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.4" />
+ </prod>
+ <prod vendor="oracle" name="database_11i">
+ <vers num="11.1.0.6" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="5.5" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="4.9" name="CVE-2008-3996" seq="2008-3996" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_CDC_IPUBLISH.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_10g">
+ <vers num="10.1.0.5" />
+ <vers num="10.2.0.4" />
+ </prod>
+ <prod vendor="oracle" name="database_11i">
+ <vers num="11.1.0.6" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:N)" CVSS_base_score="4.9" CVSS_exploit_subscore="6.8" CVSS_impact_subscore="4.9" name="CVE-2008-3998" seq="2008-3998" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.9" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle iStore component in Oracle E-Business Suite 12.0.4 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="e-business_suite">
+ <vers num="12.0.4" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)" CVSS_base_score="6.4" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="4.9" name="CVE-2008-4000" seq="2008-4000" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="6.4" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.18 and 8.49.14 allows remote attackers to affect confidentiality and integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="jdedwards" name="enterpriseone">
+ <vers num="8.48.18" />
+ </prod>
+ <prod vendor="oracle" name="jd_edwards_enterpriseone">
+ <vers num="8.49.14" />
+ </prod>
+ <prod vendor="oracle" name="peoplesoft_enterprise">
+ <vers num="8.48.18" />
+ </prod>
+ <prod vendor="oracle" name="peoplesoft_peopletools">
+ <vers num="8.49.14" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:N)" CVSS_base_score="4.9" CVSS_exploit_subscore="6.8" CVSS_impact_subscore="4.9" name="CVE-2008-4001" seq="2008-4001" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.9" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the PeopleSoft Enterprise Portal component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne EP 8.9 and EP 9.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="jd_edwards_enterpriseone_ep">
+ <vers num="8.9" />
+ <vers num="9.0" />
+ </prod>
+ <prod vendor="oracle" name="peoplesoft_enterprise">
+ <vers num="8.9" />
+ <vers num="9.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:N/A:N)" CVSS_base_score="3.5" CVSS_exploit_subscore="6.8" CVSS_impact_subscore="2.9" name="CVE-2008-4002" seq="2008-4002" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="3.5" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.18 and 8.49.14 allows remote authenticated users to affect confidentiality via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="jd_edwards_enterpriseone">
+ <vers num="8.48.18" />
+ <vers num="8.49.14" />
+ </prod>
+ <prod vendor="oracle" name="peoplesoft_enterprise">
+ <vers num="8.48.18" />
+ <vers num="8.49.14" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4003" seq="2008-4003" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.18 and 8.49.14 allows remote attackers to affect confidentiality via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="jd_edwards_enterpriseone">
+ <vers num="8.48.18" />
+ <vers num="8.49.14" />
+ </prod>
+ <prod vendor="oracle" name="peoplesoft_enterprise">
+ <vers num="8.48.18" />
+ <vers num="8.49.14" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:S/C:P/I:P/A:N)" CVSS_base_score="3.2" CVSS_exploit_subscore="3.1" CVSS_impact_subscore="4.9" name="CVE-2008-4004" seq="2008-4004" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="3.2" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the JDE EnterpriseOne Business Service Server component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.97.2.2 and 8.98.0.1 allows local users to affect confidentiality and integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="jdedwards" name="enterpriseone">
+ <vers num="8.97.2.2" />
+ <vers num="8.98.0.1" />
+ </prod>
+ <prod vendor="oracle" name="peoplesoft_enterprise">
+ <vers num="8.97.2.2" />
+ <vers num="8.98.0.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:H/Au:M/C:P/I:P/A:P)" CVSS_base_score="4.3" CVSS_exploit_subscore="3.2" CVSS_impact_subscore="6.4" name="CVE-2008-4005" seq="2008-4005" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the Oracle Application Express component in Oracle Database 11.1.0.6 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="database_11i">
+ <vers num="11.1.0.6" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4008" seq="2008-4008" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="bea_product_suite">
+ <vers edition="mp1" num="10.0" />
+ <vers num="10.3" />
+ <vers edition="sp7" num="6.1" />
+ <vers edition="sp7" num="7.0" />
+ <vers edition="sp6" num="8.1" />
+ <vers num="9.0" />
+ <vers num="9.1" />
+ <vers edition="mp3" num="9.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)" CVSS_base_score="5.1" CVSS_exploit_subscore="4.9" CVSS_impact_subscore="6.4" name="CVE-2008-4009" seq="2008-4009" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.1" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 9.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="bea_product_suite">
+ <vers num="9.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-4010" seq="2008-4010" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the WebLogic Workshop component in BEA Product Suite 10.3, 10.2, 10.0 MP1, 9.2 MP3, and 8.1 SP6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="bea_product_suite">
+ <vers edition="mp1" num="10.0" />
+ <vers num="10.2" />
+ <vers num="10.3" />
+ <vers edition="sp6" num="8.1" />
+ <vers edition="mp3" num="9.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:H/Au:S/C:N/I:P/A:N)" CVSS_base_score="2.1" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="2.9" name="CVE-2008-4011" seq="2008-4011" severity="Low" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="2.1" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, and 9.0 allows remote authenticated users to affect integrity via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="bea_product_suite">
+ <vers edition="mp1" num="10.0" />
+ <vers num="9.0" />
+ <vers num="9.1" />
+ <vers edition="mp3" num="9.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)" CVSS_base_score="5.1" CVSS_exploit_subscore="4.9" CVSS_impact_subscore="6.4" name="CVE-2008-4012" seq="2008-4012" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="5.1" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the WebLogic Workshop component in BEA Product Suite WLW 8.1SP5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html" adv="1">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="bea" name="weblogic_workshop">
+ <vers edition="sp5" num="8.1" />
+ </prod>
+ <prod vendor="oracle" name="weblogic_workshop">
+ <vers edition="sp5" num="8.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-4013" seq="2008-4013" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html">http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="oracle" name="bea_product_suite">
+ <vers edition="mp1" num="10.0" />
+ <vers edition="sp6" num="8.1" />
+ <vers num="9.0" />
+ <vers num="9.1" />
+ <vers edition="mp3" num="9.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4478" seq="2008-4478" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.73 before 8.7.3.10 ftf1, allow remote attackers to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, which triggers a heap-based buffer overflow.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-065">http://www.zerodayinitiative.com/advisories/ZDI-08-065</ref>
+ <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-063">http://www.zerodayinitiative.com/advisories/ZDI-08-063</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497165/100/0/threaded">20081008 ZDI-08-065: Novell eDirectory Core Protocol Opcode 0x0F Heap Overflow Vulnerability</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497163/100/0/threaded">20081008 ZDI-08-063: Novell eDirectory dhost.exe Content-Length Header Heap Overflow Vulnerability</ref>
+ <ref source="CONFIRM" url="http://www.novell.com/support/php/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=7001184&amp;sliceId=1&amp;docTypeID=DT_TID_1_1&amp;dialogID=78066829&amp;stateId=0%200%2078062953" adv="1">http://www.novell.com/support/php/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=7001184&amp;sliceId=1&amp;docTypeID=DT_TID_1_1&amp;dialogID=78066829&amp;stateId=0%200%2078062953</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="novell" name="edirectory">
+ <vers num="8.7" />
+ <vers edition="sp1" num="8.7.1" />
+ <vers num="8.7.3" />
+ <vers num="8.7.3.10" prev="1" />
+ <vers num="8.7.3.8" />
+ <vers num="8.7.3.8_presp9" />
+ <vers edition="" num="8.7.3.9" />
+ <vers edition=":linux" num="8.7.3.9" />
+ <vers edition=":windows_2003" num="8.7.3.9" />
+ <vers edition=":solaris" num="8.7.3.9" />
+ <vers edition=":windows_2000" num="8.7.3.9" />
+ <vers edition="" num="8.8" />
+ <vers edition=":solaris" num="8.8" />
+ <vers edition=":windows_2003" num="8.8" />
+ <vers edition=":windows_2000" num="8.8" />
+ <vers edition=":linux" num="8.8" />
+ <vers edition="" num="8.8.1" />
+ <vers edition=":windows_2003" num="8.8.1" />
+ <vers edition=":windows_2000" num="8.8.1" />
+ <vers edition=":linux" num="8.8.1" />
+ <vers edition=":solaris" num="8.8.1" />
+ <vers edition="" num="8.8.2" />
+ <vers edition=":solaris" num="8.8.2" />
+ <vers edition=":windows_2000" num="8.8.2" />
+ <vers edition=":windows_2003" num="8.8.2" />
+ <vers edition=":linux" num="8.8.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4479" seq="2008-4479" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-064">http://www.zerodayinitiative.com/advisories/ZDI-08-064</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497164/100/0/threaded">20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability</ref>
+ <ref source="CONFIRM" url="http://www.novell.com/support/php/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=7000086&amp;sliceId=1&amp;docTypeID=DT_TID_1_1&amp;dialogID=78066829&amp;stateId=0%200%2078062953">http://www.novell.com/support/php/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=7000086&amp;sliceId=1&amp;docTypeID=DT_TID_1_1&amp;dialogID=78066829&amp;stateId=0%200%2078062953</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="novell" name="edirectory">
+ <vers num="8.7.3" />
+ <vers num="8.7.3.10" prev="1" />
+ <vers num="8.7.3.8" />
+ <vers num="8.7.3.8_presp9" />
+ <vers edition="" num="8.7.3.9" />
+ <vers edition=":windows_2003" num="8.7.3.9" />
+ <vers edition=":solaris" num="8.7.3.9" />
+ <vers edition=":linux" num="8.7.3.9" />
+ <vers edition=":windows_2000" num="8.7.3.9" />
+ <vers edition="" num="8.8" />
+ <vers edition=":solaris" num="8.8" />
+ <vers edition=":windows_2003" num="8.8" />
+ <vers edition=":windows_2000" num="8.8" />
+ <vers edition=":linux" num="8.8" />
+ <vers edition="" num="8.8.1" />
+ <vers edition=":windows_2000" num="8.8.1" />
+ <vers edition=":linux" num="8.8.1" />
+ <vers edition=":windows_2003" num="8.8.1" />
+ <vers edition=":solaris" num="8.8.1" />
+ <vers edition="" num="8.8.2" prev="1" />
+ <vers edition=":linux" num="8.8.2" prev="1" />
+ <vers edition=":solaris" num="8.8.2" prev="1" />
+ <vers edition=":windows_2000" num="8.8.2" prev="1" />
+ <vers edition=":windows_2003" num="8.8.2" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4480" seq="2008-4480" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocates a heap buffer.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MISC" url="http://www.zerodayinitiative.com/advisories/ZDI-08-066/">http://www.zerodayinitiative.com/advisories/ZDI-08-066/</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497169/100/0/threaded">20081008 ZDI-08-066: Novell eDirectory Core Protocol Opcode 0x24 Heap Overflow Vulnerability</ref>
+ <ref source="CONFIRM" url="http://www.novell.com/support/php/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=7001183&amp;sliceId=1&amp;docTypeID=DT_TID_1_1&amp;dialogID=78066829&amp;stateId=0%200%2078062953" adv="1">http://www.novell.com/support/php/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=7001183&amp;sliceId=1&amp;docTypeID=DT_TID_1_1&amp;dialogID=78066829&amp;stateId=0%200%2078062953</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="novell" name="edirectory">
+ <vers num="8.7.3" />
+ <vers num="8.7.3.10" prev="1" />
+ <vers num="8.7.3.8" />
+ <vers num="8.7.3.8_presp9" />
+ <vers edition="" num="8.7.3.9" />
+ <vers edition=":windows_2003" num="8.7.3.9" />
+ <vers edition=":solaris" num="8.7.3.9" />
+ <vers edition=":linux" num="8.7.3.9" />
+ <vers edition=":windows_2000" num="8.7.3.9" />
+ <vers edition="" num="8.8" />
+ <vers edition=":solaris" num="8.8" />
+ <vers edition=":windows_2003" num="8.8" />
+ <vers edition=":windows_2000" num="8.8" />
+ <vers edition=":linux" num="8.8" />
+ <vers edition="" num="8.8.1" />
+ <vers edition=":windows_2000" num="8.8.1" />
+ <vers edition=":linux" num="8.8.1" />
+ <vers edition=":windows_2003" num="8.8.1" />
+ <vers edition=":solaris" num="8.8.1" />
+ <vers edition="" num="8.8.2" prev="1" />
+ <vers edition=":linux" num="8.8.2" prev="1" />
+ <vers edition=":solaris" num="8.8.2" prev="1" />
+ <vers edition=":windows_2000" num="8.8.2" prev="1" />
+ <vers edition=":windows_2003" num="8.8.2" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4556" seq="2008-4556" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Stack-based buffer overflow in the adm_build_path function in sadmind in Sun Solstice AdminSuite on Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted request.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31751">31751</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497311/100/0/threaded">20081014 [RISE-2008001] Sun Solstice AdminSuite sadmind adm_build_path()Buffer Overflow Vulnerability</ref>
+ <ref source="MISC" url="http://risesecurity.org/advisories/RISE-2008001.txt">http://risesecurity.org/advisories/RISE-2008001.txt</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="sun" name="solaris">
+ <vers edition="" num="8" />
+ <vers edition=":x86" num="8" />
+ <vers edition=":sparc" num="8" />
+ <vers edition="" num="9" />
+ <vers edition=":x86" num="9" />
+ <vers edition=":sparc" num="9" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4557" seq="2008-4557" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">plugins/wacko/highlight/html.php in Strawberry in CuteNews.ru 1.1.1 (aka Strawberry) allows remote attackers to execute arbitrary PHP code via the text parameter, which is inserted into an executable regular expression.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/39450">cutenews-html-code-execution(39450)</ref>
+ <ref source="OSVDB" url="http://www.osvdb.org/40236">40236</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/4851">4851</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/28330" adv="1">28330</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="cutephp" name="cutenews">
+ <vers num="1.1.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-4558" seq="2008-4558" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Array index error in VLC media player 0.9.2 allows remote attackers to overwrite arbitrary memory and execute arbitrary code via an XSPF playlist file with a negative identifier tag, which passes a signed comparison.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MISC" patch="1" url="http://www.coresecurity.com/content/vlc-xspf-memory-corruption">http://www.coresecurity.com/content/vlc-xspf-memory-corruption</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="videolan" name="vlc_media_player">
+ <vers num="0.9.2" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)" CVSS_base_score="9.0" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="10.0" name="CVE-2008-1446" seq="2008-1446" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx">MS08-062</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="iis">
+ <vers num="5.0" />
+ <vers num="5.1" />
+ <vers edition="beta" num="6.0" />
+ <vers num="7.0" />
+ </prod>
+ <prod vendor="microsoft" name="windows_2000">
+ <vers edition="sp4" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2003">
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers edition="sp1:itanium" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp2:itanium" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2008">
+ <vers edition=":itanium" num="" />
+ <vers edition=":x32" num="" />
+ <vers edition=":x64" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_xp">
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp3" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-2250" seq="2008-2250" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-15">
+ <desc>
+ <descript source="cve">The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate window properties sent from a parent window to a child window during creation of a new window, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Window Creation Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx" adv="1">MS08-061</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_2000">
+ <vers edition="sp4" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2003">
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers edition="sp1:itanium" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp2:itanium" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2008">
+ <vers edition=":itanium" num="" />
+ <vers edition=":x32" num="" />
+ <vers edition=":x64" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_vista">
+ <vers edition=":x64" num="" />
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers num="sp1" />
+ </prod>
+ <prod vendor="microsoft" name="windows_xp">
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp3" num="" />
+ <vers edition="x64" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-2251" seq="2008-2251" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Double free vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that makes system calls within multiple threads, aka "Windows Kernel Unhandled Exception Vulnerability." NOTE: according to Microsoft, this is not a duplicate of CVE-2008-4510.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx" adv="1">MS08-061</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_2000">
+ <vers edition="sp4" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2003">
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers edition="sp1:itanium" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp2:itanium" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2008">
+ <vers edition=":itanium" num="" />
+ <vers edition=":x32" num="" />
+ <vers edition=":x64" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_xp">
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp3" num="" />
+ <vers edition="x64" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-2252" seq="2008-2252" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-15">
+ <desc>
+ <descript source="cve">The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx" adv="1">MS08-061</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_2000">
+ <vers edition="sp4" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2003">
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers edition="sp1:itanium" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp2:itanium" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2008">
+ <vers edition=":itanium" num="" />
+ <vers edition=":x32" num="" />
+ <vers edition=":x64" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_vista">
+ <vers edition=":x64" num="" />
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers num="sp1" />
+ </prod>
+ <prod vendor="microsoft" name="windows_xp">
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp3" num="" />
+ <vers edition="x64" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-3464" seq="2008-3464" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-15">
+ <desc>
+ <descript source="cve">afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP1 and SP2 does not properly validate input sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "AFD Kernel Overwrite Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx" adv="1">MS08-066</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_2003_server">
+ <vers edition=":x64" num="" />
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:itanium" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:itanium" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp3" num="professional" />
+ </prod>
+ <prod vendor="microsoft" name="windows_xp">
+ <vers edition=":professional_x64" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:professional_x64" num="" />
+ <vers edition="sp3" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-3466" seq="2008-3466" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary code via a crafted SNA RPC message, aka "HIS Command Execution Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx" adv="1">MS08-059</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsft" name="host_integration_server">
+ <vers edition="sp2" num="2000" />
+ <vers edition="sp2:server" num="2000" />
+ <vers edition="unknown" num="2000" />
+ <vers edition="unknown:administrator_client" num="2000" />
+ <vers edition="sp1" num="2004" />
+ <vers edition="sp1:server" num="2004" />
+ <vers edition="unknown" num="2004" />
+ <vers edition="unknown:client" num="2004" />
+ <vers edition="unknown:server" num="2004" />
+ <vers edition="unknown" num="2006" />
+ <vers edition="unknown:x32" num="2006" />
+ <vers edition="x64" num="2006unknown" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-3471" seq="2008-3471" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 SP3; Office Excel Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac do not properly allocate memory when loading Excel objects during parsing of the Excel spreadsheet file format, which allows remote attackers to execute arbitrary code via a crafted BIFF file, aka "File Format Parsing Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx">MS08-057</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsft" name="open_xml_file_format_converter">
+ <vers edition="mac" num="unknown" />
+ </prod>
+ <prod vendor="microsoft" name="office">
+ <vers edition="sp3" num="2000" />
+ <vers edition="sp2" num="2003" />
+ <vers edition="sp3" num="2003" />
+ <vers edition="" num="2004" />
+ <vers edition=":mac" num="2004" />
+ <vers edition="sp1" num="2007" />
+ <vers edition="" num="2008" />
+ <vers edition=":mac" num="2008" />
+ <vers edition="sp3" num="xp" />
+ </prod>
+ <prod vendor="microsoft" name="office_compatibility_pack_for_word_excel_ppt_2007">
+ <vers edition=":sp1" num="" />
+ </prod>
+ <prod vendor="microsoft" name="office_excel_viewer">
+ <vers edition="sp3" num="2003" />
+ </prod>
+ <prod vendor="microsoft" name="office_sharepoint_server">
+ <vers edition="sp1" num="2007" />
+ <vers edition="sp1:x64" num="2007" />
+ <vers edition="unknown" num="2007" />
+ <vers edition="unknown:x64" num="2007" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-3472" seq="2008-3472" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Internet Explorer 6 and 7 does not properly determine the domain or security zone of origin of web script, which allows remote attackers to bypass the intended cross-domain security policy, and execute arbitrary code or obtain sensitive information, via a crafted HTML document, aka "HTML Element Cross-Domain Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx">MS08-058</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="internet_explorer">
+ <vers edition="sp4" num="5.01" />
+ <vers edition="sp1" num="6" />
+ <vers num="7" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-3473" seq="2008-3473" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Internet Explorer 6 and 7 does not properly determine the domain or security zone of origin of web script, which allows remote attackers to bypass the intended cross-domain security policy, and execute arbitrary code or obtain sensitive information, via a crafted HTML document, aka "Event Handling Cross-Domain Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx" adv="1">MS08-058</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="internet_explorer">
+ <vers edition="sp4" num="5.01" />
+ <vers edition="sp1" num="6" />
+ <vers num="7" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-3474" seq="2008-3474" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Internet Explorer 6 and 7 does not properly determine the domain or security zone of origin of web script, which allows remote attackers to bypass the intended cross-domain security policy and obtain sensitive information via a crafted HTML document, aka "Cross-Domain Information Disclosure Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx">MS08-058</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="internet_explorer">
+ <vers edition="sp4" num="5.01" />
+ <vers edition="sp1" num="6" />
+ <vers num="7" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-3475" seq="2008-3475" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Internet Explorer 6 does not properly handle errors associated with access to an object that has been (1) incorrectly initialized or (2) deleted, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Uninitialized Memory Corruption Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx" adv="1">MS08-058</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="internet_explorer">
+ <vers edition="sp4" num="5.01" />
+ <vers edition="sp1" num="6" />
+ <vers num="7" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-3476" seq="2008-3476" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle errors associated with access to uninitialized memory, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "HTML Objects Memory Corruption Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx" adv="1">MS08-058</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="internet_explorer">
+ <vers edition="sp4" num="5.01" />
+ <vers edition="sp1" num="6" />
+ <vers num="7" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-3477" seq="2008-3477" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Microsoft Excel 2000 SP3, 2002 SP3, and 2003 SP2 and SP3 does not properly validate data in the VBA Performance Cache, which allows remote attackers to execute arbitrary code via a crafted Excel file, aka "Calendar Object Validation Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx" adv="1">MS08-057</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="internet_explorer">
+ <vers edition="sp4" num="5.01" />
+ <vers edition="sp1" num="6" />
+ <vers num="7" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-3479" seq="2008-3479" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">The Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 SP4 does not properly validate parameters to string APIs, which allows remote attackers to execute arbitrary code via a crafted RPC call that overflows a "heap request," aka "Message Queuing Service Remote Code Execution Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-065.mspx" adv="1">MS08-065</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_2000">
+ <vers edition="sp4" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-4019" seq="2008-4019" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Integer overflow in the REPT function in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 SP3; Office Excel Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office SharePoint Server 2007 Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file containing a formula within a cell, aka "Formula Parsing Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx" adv="1">MS08-057</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsft" name="open_xml_file_format_converter">
+ <vers edition="mac" num="unknown" />
+ </prod>
+ <prod vendor="microsoft" name="office">
+ <vers edition="sp3" num="2000" />
+ <vers edition="sp2" num="2003" />
+ <vers edition="sp3" num="2003" />
+ <vers edition="" num="2004" />
+ <vers edition=":mac" num="2004" />
+ <vers edition="sp1" num="2007" />
+ <vers edition="" num="2008" />
+ <vers edition=":mac" num="2008" />
+ <vers edition="sp3" num="xp" />
+ </prod>
+ <prod vendor="microsoft" name="office_compatibility_pack_for_word_excel_ppt_2007">
+ <vers edition=":sp1" num="" />
+ </prod>
+ <prod vendor="microsoft" name="office_excel_viewer">
+ <vers edition="sp3" num="2003" />
+ </prod>
+ <prod vendor="microsoft" name="office_sharepoint_server">
+ <vers edition="sp1" num="2007" />
+ <vers edition="sp1:x64" num="2007" />
+ <vers edition="unknown" num="2007" />
+ <vers edition="unknown:x64" num="2007" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4020" seq="2008-4020" severity="Medium" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in Microsoft Office XP SP3 allows remote attackers to inject arbitrary web script or HTML via a document that contains a "Content-Disposition: attachment" header and is accessed through a cdo: URL, which renders the content instead of raising a File Download dialog box, aka "Vulnerability in Content-Disposition Header Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-056.mspx" adv="1">MS08-056</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="office">
+ <vers edition="sp3" num="xp" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4023" seq="2008-4023" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Active Directory in Microsoft Windows 2000 SP4 does not properly allocate memory for (1) LDAP and (2) LDAPS requests, which allows remote attackers to execute arbitrary code via a crafted request, aka "Active Directory Overflow Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-060.mspx" adv="1">MS08-060</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_2000">
+ <vers edition="sp4" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-4036" seq="2008-4036" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for Virtual Address Descriptors (VADs) and a "memory allocation mapping error," aka "Virtual Address Descriptor Elevation of Privilege Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx">MS08-064</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_server_2003">
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers edition="sp1:itanium" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp2:itanium" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2008">
+ <vers edition=":itanium" num="" />
+ <vers edition=":x32" num="" />
+ <vers edition=":x64" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_vista">
+ <vers edition=":x64" num="" />
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers num="sp1" />
+ </prod>
+ <prod vendor="microsoft" name="windows_xp">
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp3" num="" />
+ <vers edition="x64" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4038" seq="2008-4038" severity="High" type="CVE" published="2008-10-14" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Buffer underflow in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a Server Message Block (SMB) request that contains a filename with a crafted length, aka "SMB Buffer Underflow Vulnerability."</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MS" url="http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx" adv="1">MS08-063</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="microsoft" name="windows_2000">
+ <vers edition="sp4" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2003">
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers edition="sp1:itanium" num="" />
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp2:itanium" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_server_2008">
+ <vers edition=":itanium" num="" />
+ <vers edition=":x32" num="" />
+ <vers edition=":x64" num="" />
+ </prod>
+ <prod vendor="microsoft" name="windows_vista">
+ <vers edition=":x64" num="" />
+ <vers edition="sp1" num="" />
+ <vers edition="sp1:x64" num="" />
+ <vers num="sp1" />
+ </prod>
+ <prod vendor="microsoft" name="windows_xp">
+ <vers edition="sp2" num="" />
+ <vers edition="sp2:x64" num="" />
+ <vers edition="sp3" num="" />
+ <vers edition="x64" num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4569" seq="2008-4569" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-16">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in xlacomments.asp in XIGLA Software Absolute Poll Manager XE 4.1 allows remote attackers to execute arbitrary SQL commands via the p parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31724">31724</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6731">6731</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="xigla" name="absolute_poll_manager_xe">
+ <vers num="4.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4570" seq="2008-4570" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-16">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in index.php in Real Estate Classifieds allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31723">31723</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6736">6736</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32223" adv="1">32223</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="real-estate-scripts" name="real-estate-scripts">
+ <vers num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4571" seq="2008-4571" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in the LiveSearch module in Plone before 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the Description field for search results, as demonstrated using the onerror Javascript even in an IMG tag.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/27098">27098</ref>
+ <ref source="CONFIRM" patch="1" url="http://plone.org/products/plone/releases/3.0.4">http://plone.org/products/plone/releases/3.0.4</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/28293" adv="1">28293</ref>
+ <ref source="CONFIRM" url="http://dev.plone.org/plone/ticket/7439" adv="1">http://dev.plone.org/plone/ticket/7439</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="plone" name="plone">
+ <vers num="2.0.5" />
+ <vers num="2.1.2" />
+ <vers num="2.5" />
+ <vers num="2.5.1" />
+ <vers num="2.5.1_rc" />
+ <vers num="2.5.4" />
+ <vers num="2.5_beta1" />
+ <vers num="3.0" />
+ <vers num="3.0.1" />
+ <vers num="3.0.2" />
+ <vers num="3.0.3" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4572" seq="2008-4572" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-16">
+ <desc>
+ <descript source="cve">GuildFTPd 0.999.14, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long arguments to the CWD and LIST commands, which triggers heap corruption related to an improper free call, and possibly triggering a heap-based buffer overflow.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31729">31729</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6738">6738</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2794" adv="1">ADV-2008-2794</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32218" adv="1">32218</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="guildftpd" name="guildftpd">
+ <vers num="0.999.14" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4573" seq="2008-4573" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-16">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in kategori.asp in MunzurSoft Wep Portal W3 allows remote attackers to execute arbitrary SQL commands via the kat parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31713">31713</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6725">6725</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32238" adv="1">32238</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="aspindir" name="munzursoft_web_portal_w3">
+ <vers num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4574" seq="2008-4574" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-16">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in default.asp in Ayco Okul Portali allows remote attackers to execute arbitrary SQL commands via the linkid parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45801">aop-linkid-sql-injection(45801)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31704">31704</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6720">6720</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32244">32244</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="aspindir" name="ayco_okul_portali">
+ <vers num="" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-4553" seq="2008-4553" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-16">
+ <desc>
+ <descript source="cve">qemu-make-debian-root in qemu 0.9.1-5 on Debian GNU/Linux allows local users to overwrite arbitrary files via a symlink attack on temporary files and directories.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/14/4">[oss-security] 20081014 Re: CVE id request: qemu</ref>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/13/2">[oss-security] 20081013 CVE id request: qemu</ref>
+ <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496394">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496394</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="qemu" name="qemu">
+ <vers num="0.9.1-5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="4.6" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="6.4" name="CVE-2008-4554" seq="2008-4554" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="4.6" modified="2008-10-16">
+ <desc>
+ <descript source="cve">The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/14/5">[oss-security] 20081014 Re: CVE request: kernel: don't allow splice() to files opened with O_APPEND</ref>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/13/1">[oss-security] 20081013 CVE request: kernel: don't allow splice() to files opened with O_APPEND</ref>
+ <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27</ref>
+ <ref source="CONFIRM" url="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git;a=commit;h=efc968d450e013049a662d22727cf132618dcb2f">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git;a=commit;h=efc968d450e013049a662d22727cf132618dcb2f</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="linux" name="kernel">
+ <vers num="2.2.27" />
+ <vers num="2.4.36" />
+ <vers num="2.4.36.1" />
+ <vers num="2.4.36.2" />
+ <vers num="2.4.36.3" />
+ <vers num="2.4.36.4" />
+ <vers num="2.4.36.5" />
+ <vers num="2.4.36.6" />
+ <vers num="2.6" />
+ <vers edition="rc1" num="2.6.18" />
+ <vers edition="rc2" num="2.6.18" />
+ <vers edition="rc3" num="2.6.18" />
+ <vers edition="rc4" num="2.6.18" />
+ <vers edition="rc5" num="2.6.18" />
+ <vers edition="rc6" num="2.6.18" />
+ <vers edition="rc7" num="2.6.18" />
+ <vers num="2.6.19.4" />
+ <vers num="2.6.19.5" />
+ <vers num="2.6.19.6" />
+ <vers num="2.6.19.7" />
+ <vers num="2.6.20.16" />
+ <vers num="2.6.20.17" />
+ <vers num="2.6.20.18" />
+ <vers num="2.6.20.19" />
+ <vers num="2.6.20.20" />
+ <vers num="2.6.20.21" />
+ <vers num="2.6.21.5" />
+ <vers num="2.6.21.6" />
+ <vers num="2.6.21.7" />
+ <vers num="2.6.22" />
+ <vers num="2.6.22.1" />
+ <vers num="2.6.22.10" />
+ <vers num="2.6.22.11" />
+ <vers num="2.6.22.12" />
+ <vers num="2.6.22.13" />
+ <vers num="2.6.22.14" />
+ <vers num="2.6.22.15" />
+ <vers num="2.6.22.17" />
+ <vers num="2.6.22.18" />
+ <vers num="2.6.22.19" />
+ <vers num="2.6.22.2" />
+ <vers num="2.6.22.20" />
+ <vers num="2.6.22.21" />
+ <vers num="2.6.22.22" />
+ <vers num="2.6.22.8" />
+ <vers num="2.6.22.9" />
+ <vers num="2.6.22_rc1" />
+ <vers num="2.6.22_rc7" />
+ <vers num="2.6.23" />
+ <vers num="2.6.23.10" />
+ <vers num="2.6.23.11" />
+ <vers num="2.6.23.12" />
+ <vers num="2.6.23.13" />
+ <vers num="2.6.23.15" />
+ <vers num="2.6.23.16" />
+ <vers num="2.6.23.17" />
+ <vers num="2.6.23.8" />
+ <vers num="2.6.23.9" />
+ <vers num="2.6.23_rc1" />
+ <vers num="2.6.24" />
+ <vers num="2.6.24.1" />
+ <vers num="2.6.24.2" />
+ <vers num="2.6.24.3" />
+ <vers num="2.6.24.4" />
+ <vers num="2.6.24.5" />
+ <vers num="2.6.24.6" />
+ <vers num="2.6.24.7" />
+ <vers num="2.6.24_rc1" />
+ <vers num="2.6.24_rc4" />
+ <vers num="2.6.24_rc5" />
+ <vers edition="" num="2.6.25" />
+ <vers edition=":x86_64" num="2.6.25" />
+ <vers edition="" num="2.6.25.1" />
+ <vers edition=":x86_64" num="2.6.25.1" />
+ <vers edition="" num="2.6.25.10" />
+ <vers edition=":x86_64" num="2.6.25.10" />
+ <vers edition="" num="2.6.25.11" />
+ <vers edition=":x86_64" num="2.6.25.11" />
+ <vers edition="" num="2.6.25.12" />
+ <vers edition=":x86_64" num="2.6.25.12" />
+ <vers num="2.6.25.13" />
+ <vers num="2.6.25.14" />
+ <vers num="2.6.25.15" />
+ <vers edition="" num="2.6.25.2" />
+ <vers edition=":x86_64" num="2.6.25.2" />
+ <vers edition="" num="2.6.25.3" />
+ <vers edition=":x86_64" num="2.6.25.3" />
+ <vers edition="" num="2.6.25.4" />
+ <vers edition=":x86_64" num="2.6.25.4" />
+ <vers edition="" num="2.6.25.5" />
+ <vers edition=":x86_64" num="2.6.25.5" />
+ <vers edition="" num="2.6.25.6" />
+ <vers edition=":x86_64" num="2.6.25.6" />
+ <vers edition="" num="2.6.25.7" />
+ <vers edition=":x86_64" num="2.6.25.7" />
+ <vers edition="" num="2.6.25.8" />
+ <vers edition=":x86_64" num="2.6.25.8" />
+ <vers edition="" num="2.6.25.9" />
+ <vers edition=":x86_64" num="2.6.25.9" />
+ <vers edition="rc4" num="2.6.26" />
+ <vers num="2.6.26.1" />
+ <vers num="2.6.26.2" />
+ <vers num="2.6.26.3" />
+ <vers num="2.6.26.4" />
+ <vers num="2.6.26.5" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4575" seq="2008-4575" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-15">
+ <desc>
+ <descript source="cve">Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) possibly other unspecified vectors.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="CONFIRM" url="https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020">https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020</ref>
+ <ref source="CONFIRM" url="http://www.sentex.net/~mwandel/jhead/changes.txt">http://www.sentex.net/~mwandel/jhead/changes.txt</ref>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/15/6">[oss-security] 20081015 Re: CVE request: jhead</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="sentex" name="jhead">
+ <vers num="1.2" />
+ <vers num="1.3" />
+ <vers num="1.4" />
+ <vers num="1.5" />
+ <vers num="1.6" />
+ <vers num="1.7" />
+ <vers num="1.8" />
+ <vers num="1.9" />
+ <vers num="2.0" />
+ <vers num="2.1" />
+ <vers num="2.2" />
+ <vers num="2.3" />
+ <vers num="2.4" />
+ <vers num="2.4-1" />
+ <vers num="2.4-2" />
+ <vers num="2.5" />
+ <vers num="2.6" />
+ <vers num="2.7" />
+ <vers num="2.8" />
+ <vers num="2.82" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)" CVSS_base_score="7.8" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.9" name="CVE-2008-4576" seq="2008-4576" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.8" modified="2008-10-16">
+ <desc>
+ <descript source="cve">sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MLIST" url="http://www.gossamer-threads.com/lists/linux/kernel/981012?page=last">[linux-kernel] 20081006 [patch 58/71] sctp: Fix oops when INIT-ACK indicates that peer doesnt support AUTH</ref>
+ <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.18">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.18</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="linux" name="kernel">
+ <vers num="2.2.27" />
+ <vers num="2.4.36" />
+ <vers num="2.4.36.1" />
+ <vers num="2.4.36.2" />
+ <vers num="2.4.36.3" />
+ <vers num="2.4.36.4" />
+ <vers num="2.4.36.5" />
+ <vers num="2.4.36.6" />
+ <vers num="2.6" />
+ <vers edition="rc1" num="2.6.18" />
+ <vers edition="rc2" num="2.6.18" />
+ <vers edition="rc3" num="2.6.18" />
+ <vers edition="rc4" num="2.6.18" />
+ <vers edition="rc5" num="2.6.18" />
+ <vers edition="rc6" num="2.6.18" />
+ <vers edition="rc7" num="2.6.18" />
+ <vers num="2.6.19.4" />
+ <vers num="2.6.19.5" />
+ <vers num="2.6.19.6" />
+ <vers num="2.6.19.7" />
+ <vers num="2.6.20.16" />
+ <vers num="2.6.20.17" />
+ <vers num="2.6.20.18" />
+ <vers num="2.6.20.19" />
+ <vers num="2.6.20.20" />
+ <vers num="2.6.20.21" />
+ <vers num="2.6.21.5" />
+ <vers num="2.6.21.6" />
+ <vers num="2.6.21.7" />
+ <vers num="2.6.22" />
+ <vers num="2.6.22.1" />
+ <vers num="2.6.22.10" />
+ <vers num="2.6.22.11" />
+ <vers num="2.6.22.12" />
+ <vers num="2.6.22.13" />
+ <vers num="2.6.22.14" />
+ <vers num="2.6.22.15" />
+ <vers num="2.6.22.17" />
+ <vers num="2.6.22.18" />
+ <vers num="2.6.22.19" />
+ <vers num="2.6.22.2" />
+ <vers num="2.6.22.20" />
+ <vers num="2.6.22.21" />
+ <vers num="2.6.22.22" />
+ <vers num="2.6.22.8" />
+ <vers num="2.6.22.9" />
+ <vers num="2.6.22_rc1" />
+ <vers num="2.6.22_rc7" />
+ <vers num="2.6.23" />
+ <vers num="2.6.23.10" />
+ <vers num="2.6.23.11" />
+ <vers num="2.6.23.12" />
+ <vers num="2.6.23.13" />
+ <vers num="2.6.23.15" />
+ <vers num="2.6.23.16" />
+ <vers num="2.6.23.17" />
+ <vers num="2.6.23.8" />
+ <vers num="2.6.23.9" />
+ <vers num="2.6.23_rc1" />
+ <vers num="2.6.24" />
+ <vers num="2.6.24.1" />
+ <vers num="2.6.24.2" />
+ <vers num="2.6.24.3" />
+ <vers num="2.6.24.4" />
+ <vers num="2.6.24.5" />
+ <vers num="2.6.24.6" />
+ <vers num="2.6.24.7" />
+ <vers num="2.6.24_rc1" />
+ <vers num="2.6.24_rc4" />
+ <vers num="2.6.24_rc5" />
+ <vers num="2.6.25" />
+ <vers edition="" num="2.6.25.1" />
+ <vers edition=":x86_64" num="2.6.25.1" />
+ <vers edition="" num="2.6.25.10" />
+ <vers edition=":x86_64" num="2.6.25.10" />
+ <vers edition="" num="2.6.25.11" />
+ <vers edition=":x86_64" num="2.6.25.11" />
+ <vers edition="" num="2.6.25.12" />
+ <vers edition=":x86_64" num="2.6.25.12" />
+ <vers num="2.6.25.13" />
+ <vers num="2.6.25.14" />
+ <vers num="2.6.25.15" />
+ <vers num="2.6.25.16" />
+ <vers num="2.6.25.17" prev="1" />
+ <vers edition="" num="2.6.25.2" />
+ <vers edition=":x86_64" num="2.6.25.2" />
+ <vers edition="" num="2.6.25.3" />
+ <vers edition=":x86_64" num="2.6.25.3" />
+ <vers edition="" num="2.6.25.4" />
+ <vers edition=":x86_64" num="2.6.25.4" />
+ <vers edition="" num="2.6.25.5" />
+ <vers edition=":x86_64" num="2.6.25.5" />
+ <vers edition="" num="2.6.25.6" />
+ <vers edition=":x86_64" num="2.6.25.6" />
+ <vers edition="" num="2.6.25.7" />
+ <vers edition=":x86_64" num="2.6.25.7" />
+ <vers edition="" num="2.6.25.8" />
+ <vers edition=":x86_64" num="2.6.25.8" />
+ <vers edition="" num="2.6.25.9" />
+ <vers edition=":x86_64" num="2.6.25.9" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)" CVSS_base_score="6.4" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="4.9" name="CVE-2008-4577" seq="2008-4577" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="6.4" modified="2008-10-16">
+ <desc>
+ <descript source="cve">The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="FRSIRT" patch="1" url="http://www.frsirt.com/english/advisories/2008/2745" adv="1">ADV-2008-2745</ref>
+ <ref source="MLIST" patch="1" url="http://www.dovecot.org/list/dovecot-news/2008-October/000085.html">[Dovecot-news] 20081005 v1.1.4 released</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31587">31587</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32164" adv="1">32164</ref>
+ <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=240409">http://bugs.gentoo.org/show_bug.cgi?id=240409</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="dovecot" name="dovecot">
+ <vers num="0.99.13" />
+ <vers num="0.99.14" />
+ <vers num="1.0" />
+ <vers num="1.0.10" />
+ <vers num="1.0.12" />
+ <vers num="1.0.2" />
+ <vers num="1.0.3" />
+ <vers num="1.0.4" />
+ <vers num="1.0.5" />
+ <vers num="1.0.6" />
+ <vers num="1.0.7" />
+ <vers num="1.0.8" />
+ <vers num="1.0.9" />
+ <vers num="1.0.beta1" />
+ <vers num="1.0.beta2" />
+ <vers num="1.0.beta3" />
+ <vers num="1.0.beta4" />
+ <vers num="1.0.beta5" />
+ <vers num="1.0.beta6" />
+ <vers num="1.0.beta7" />
+ <vers num="1.0.beta8" />
+ <vers num="1.0.beta9" />
+ <vers num="1.0.rc1" />
+ <vers num="1.0.rc10" />
+ <vers num="1.0.rc11" />
+ <vers num="1.0.rc12" />
+ <vers num="1.0.rc13" />
+ <vers num="1.0.rc14" />
+ <vers num="1.0.rc15" />
+ <vers num="1.0.rc16" />
+ <vers num="1.0.rc17" />
+ <vers num="1.0.rc18" />
+ <vers num="1.0.rc19" />
+ <vers num="1.0.rc2" />
+ <vers num="1.0.rc20" />
+ <vers num="1.0.rc21" />
+ <vers num="1.0.rc22" />
+ <vers num="1.0.rc23" />
+ <vers num="1.0.rc24" />
+ <vers num="1.0.rc25" />
+ <vers num="1.0.rc26" />
+ <vers num="1.0.rc27" />
+ <vers num="1.0.rc28" />
+ <vers num="1.0.rc3" />
+ <vers num="1.0.rc4" />
+ <vers num="1.0.rc5" />
+ <vers num="1.0.rc6" />
+ <vers num="1.0.rc7" />
+ <vers num="1.0.rc8" />
+ <vers num="1.0.rc9" />
+ <vers num="1.0_rc29" />
+ <vers edition="rc2" num="1.1" />
+ <vers num="1.1.0" />
+ <vers num="1.1.1" />
+ <vers num="1.1.2" />
+ <vers num="1.1.3" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4578" seq="2008-4578" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-16">
+ <desc>
+ <descript source="cve">The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MLIST" patch="1" url="http://www.dovecot.org/list/dovecot-news/2008-October/000085.html">[Dovecot-news] 20081005 v1.1.4 released</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31587">31587</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2745" adv="1">ADV-2008-2745</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32164" adv="1">32164</ref>
+ <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=240409">http://bugs.gentoo.org/show_bug.cgi?id=240409</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="dovecot" name="dovecot">
+ <vers num="0.99.13" />
+ <vers num="0.99.14" />
+ <vers num="1.0" />
+ <vers num="1.0.10" />
+ <vers num="1.0.12" />
+ <vers num="1.0.2" />
+ <vers num="1.0.3" />
+ <vers num="1.0.4" />
+ <vers num="1.0.5" />
+ <vers num="1.0.6" />
+ <vers num="1.0.7" />
+ <vers num="1.0.8" />
+ <vers num="1.0.9" />
+ <vers num="1.0.beta1" />
+ <vers num="1.0.beta2" />
+ <vers num="1.0.beta3" />
+ <vers num="1.0.beta4" />
+ <vers num="1.0.beta5" />
+ <vers num="1.0.beta6" />
+ <vers num="1.0.beta7" />
+ <vers num="1.0.beta8" />
+ <vers num="1.0.beta9" />
+ <vers num="1.0.rc1" />
+ <vers num="1.0.rc10" />
+ <vers num="1.0.rc11" />
+ <vers num="1.0.rc12" />
+ <vers num="1.0.rc13" />
+ <vers num="1.0.rc14" />
+ <vers num="1.0.rc15" />
+ <vers num="1.0.rc16" />
+ <vers num="1.0.rc17" />
+ <vers num="1.0.rc18" />
+ <vers num="1.0.rc19" />
+ <vers num="1.0.rc2" />
+ <vers num="1.0.rc20" />
+ <vers num="1.0.rc21" />
+ <vers num="1.0.rc22" />
+ <vers num="1.0.rc23" />
+ <vers num="1.0.rc24" />
+ <vers num="1.0.rc25" />
+ <vers num="1.0.rc26" />
+ <vers num="1.0.rc27" />
+ <vers num="1.0.rc28" />
+ <vers num="1.0.rc3" />
+ <vers num="1.0.rc4" />
+ <vers num="1.0.rc5" />
+ <vers num="1.0.rc6" />
+ <vers num="1.0.rc7" />
+ <vers num="1.0.rc8" />
+ <vers num="1.0.rc9" />
+ <vers num="1.0_rc29" />
+ <vers edition="rc2" num="1.1" />
+ <vers num="1.1.0" />
+ <vers num="1.1.1" />
+ <vers num="1.1.2" />
+ <vers num="1.1.3" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="1.9" CVSS_exploit_subscore="3.4" CVSS_impact_subscore="2.9" name="CVE-2008-4579" seq="2008-4579" severity="Low" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="1.9" modified="2008-10-16">
+ <desc>
+ <descript source="cve">The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/13/3">[oss-security] 20081013 Re: CVE Request</ref>
+ <ref source="MISC" url="http://bugs.gentoo.org/show_bug.cgi?id=240576">http://bugs.gentoo.org/show_bug.cgi?id=240576</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="gentoo" name="cman">
+ <vers edition="r1" num="2.02.00" />
+ </prod>
+ <prod vendor="gentoo" name="fence">
+ <vers edition="r1" num="2.02.00" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-4580" seq="2008-4580" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-16">
+ <desc>
+ <descript source="cve">fence_manual in fence allows local users to modify arbitrary files via a symlink attack on the fence_manual.fifo temporary file.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2008/10/13/3">[oss-security] 20081013 Re: CVE Request</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="gentoo" name="cman">
+ <vers edition="r1" num="2.02.00" />
+ </prod>
+ <prod vendor="gentoo" name="fence">
+ <vers edition="r1" num="2.02.00" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)" CVSS_base_score="4.0" CVSS_exploit_subscore="8.0" CVSS_impact_subscore="2.9" name="CVE-2008-4581" seq="2008-4581" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="4.0" modified="2008-10-16">
+ <desc>
+ <descript source="cve">The Editor in IBM ENOVIA SmarTeam 5 before release 18 SP5, and release 19 before SP01, allows remote authenticated users to bypass intended access restrictions and read Document objects via the Workflow Process (aka Flow Process) view.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31748">31748</ref>
+ <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1HD71425" adv="1">HD71425</ref>
+ <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg27012567&amp;aid=1">http://www-01.ibm.com/support/docview.wss?uid=swg27012567&amp;aid=1</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32105">32105</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="ibm" name="enovia_smarteam">
+ <vers num="5" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4582" seq="2008-4582" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Mozilla Firefox 3.0.1 through 3.0.3 on Windows does not properly identify the context of Windows .url shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information via an HTML document that is directly accessible through a filesystem, as demonstrated by documents in (1) local folders, (2) Windows share folders, and (3) RAR archives, and as demonstrated by IFRAMEs referencing shortcuts that point to (a) about:cache?device=memory and (b) about:cache?device=disk, a variant of CVE-2008-2810.</descript>
+ </desc>
+ <loss_types>
+ <conf />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497091/100/0/threaded">20081007 Firefox Privacy Broken If Used to Open Web Page File</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32192" adv="1">32192</ref>
+ <ref source="MISC" url="http://liudieyu0.blog124.fc2.com/blog-entry-6.html">http://liudieyu0.blog124.fc2.com/blog-entry-6.html</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="mozilla" name="firefox">
+ <vers num="3.0.1" />
+ <vers num="3.0.2" />
+ <vers num="3.0.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4583" seq="2008-4583" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Insecure method vulnerability in the Chilkat FTP 2.0 ActiveX component (ChilkatCert.dll) allows remote attackers to overwrite arbitrary files via a full pathname in the SavePkcs8File method.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27540">27540</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/5028">5028</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="chilkat_software" name="ftp">
+ <vers num="2.0" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)" CVSS_base_score="6.8" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="6.4" name="CVE-2008-4584" seq="2008-4584" severity="Medium" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="6.8" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Insecure method vulnerability in Chilkat Mail 7.8 ActiveX control (ChilkatCert.dll) allows remote attackers to overwrite arbitrary files via a full pathname to the SaveLastError method.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/40041">chilkatmail-chilkatcert-file-overwrite(40041)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27493">27493</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/5005">5005</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="chilkat_software" name="mail">
+ <vers num="7.8" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4585" seq="2008-4585" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Belong Software Site Builder 0.1 beta allows remote attackers to bypass intended access restrictions and perform administrative actions via a direct request to admin/home.php.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/39842">belongsitebuilder-admin-security-bypass(39842)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27402">27402</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/486803/100/200/threaded">20080122 Belong Site Builder 0.1b Bypass Admincp</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="belong_software" name="site_builder">
+ <vers edition="beta" num="0.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-4586" seq="2008-4586" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Insecure method vulnerability in the MVSNCLientWebAgent61.WebAgent.1 ActiveX control (isusweb.dll 6.1.100.61372) in Macrovision FLEXnet Connect 6.1 allows remote attackers to force the download and execution of arbitrary files via the DownloadAndExecute method.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27279">27279</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/4913">4913</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/28496" adv="1">28496</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="acresso" name="flexnet_connect">
+ <vers num="6.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" CVSS_base_score="9.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="10.0" name="CVE-2008-4587" seq="2008-4587" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="9.3" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Insecure method vulnerability in the MSVNClientDownloadManager61Lib.DownloadManager.1 ActiveX control (ISDM.exe 6.1.100.61372) in Macrovision FLEXnet Connect 6.1 allows remote attackers to force the download and execution of arbitrary files via the AddFile and RunScheduledJobs methods. NOTE: this could be leveraged for code execution by uploading executable files to Startup folders.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/39653">macrovision-flexnet-file-overwrite(39653)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/27279">27279</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/4909">4909</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/28496" adv="1">28496</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="acresso" name="flexnet_connect">
+ <vers num="6.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4588" seq="2008-4588" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Stack-based buffer overflow in the FTP server in Etype Eserv 3.x, possibly 3.26, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long argument to the ABOR command.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45864">eservftp-abor-bo(45864)</ref>
+ <ref source="MISC" url="http://www.zeroscience.org/codes/eserv_bof.txt">http://www.zeroscience.org/codes/eserv_bof.txt</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31753">31753</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6752">6752</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="etype" name="eserv">
+ <vers num="3.0" />
+ <vers num="3.25" />
+ <vers num="3.26" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="7.2" CVSS_exploit_subscore="3.9" CVSS_impact_subscore="10.0" name="CVE-2008-4589" seq="2008-4589" severity="High" type="CVE" published="2008-10-15" CVSS_version="2.0" CVSS_score="7.2" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Heap-based buffer overflow in the tvtumin.sys kernel driver in Lenovo Rescue and Recovery 4.20, including 4.20.0511 and 4.20.0512, allows local users to execute arbitrary code via a long file name.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ </loss_types>
+ <range>
+ <local />
+ </range>
+ <refs>
+ <ref source="BID" patch="1" url="http://www.securityfocus.com/bid/31737">31737</ref>
+ <ref source="CONFIRM" patch="1" url="http://www-307.ibm.com/pc/support/site.wss/MIGR-70699.html" adv="1">http://www-307.ibm.com/pc/support/site.wss/MIGR-70699.html</ref>
+ <ref source="CONFIRM" patch="1" url="http://www-307.ibm.com/pc/support/site.wss/MIGR-4Q2QAK.html" adv="1">http://www-307.ibm.com/pc/support/site.wss/MIGR-4Q2QAK.html</ref>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45839">lenovo-rescue-recovery-tvtumin-bo(45839)</ref>
+ <ref source="SECTRACK" url="http://www.securitytracker.com/id?1021041">1021041</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497277/100/0/threaded">20081010 iSEC Partners Security Advisory - 2008-002-lenovornr - Lenovo Rescue and Recovery 4.20</ref>
+ <ref source="MISC" url="http://www.isecpartners.com/advisories/2008-02-lenovornr.txt">http://www.isecpartners.com/advisories/2008-02-lenovornr.txt</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2806" adv="1">ADV-2008-2806</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32252" adv="1">32252</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="lenovo" name="resuce_and_recovery">
+ <vers num="4.20" />
+ <vers num="4.20.0511" />
+ <vers num="4.20.0512" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)" CVSS_base_score="7.5" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="6.4" name="CVE-2008-4590" seq="2008-4590" severity="High" type="CVE" published="2008-10-16" CVSS_version="2.0" CVSS_score="7.5" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Multiple SQL injection vulnerabilities in Stash 1.0.3 allow remote attackers to execute arbitrary SQL commands via (1) the username parameter to admin/login.php and (2) the post parameter to admin/news.php.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot other="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45799">stash-news-sql-injection(45799)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31687">31687</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6714">6714</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="stash" name="stash">
+ <vers num="1.0.3" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)" CVSS_base_score="4.3" CVSS_exploit_subscore="8.6" CVSS_impact_subscore="2.9" name="CVE-2008-4591" seq="2008-4591" severity="Medium" type="CVE" published="2008-10-16" CVSS_version="2.0" CVSS_score="4.3" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in admin/include/isadmin.inc.php in PhpWebGallery 1.3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) lang[access_forbiden] and (2) lang[ident_title] parameters.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ <user_init />
+ </range>
+ <refs>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6425">6425</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="phpwebgallery" name="phpwebgallery">
+ <vers num="1.3.4" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2008-4592" seq="2008-4592" severity="High" type="CVE" published="2008-10-16" CVSS_version="2.0" CVSS_score="10.0" modified="2008-10-16">
+ <desc>
+ <descript source="cve">Directory traversal vulnerability in index.php in Sports Clubs Web Panel 0.0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter.</descript>
+ </desc>
+ <loss_types>
+ <avail />
+ <conf />
+ <int />
+ <sec_prot admin="1" />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6427">6427</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2550" adv="1">ADV-2008-2550</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="sportspanel" name="sports_clubs_web_portal">
+ <vers num="0.0.1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)" CVSS_base_score="5.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="2.9" name="CVE-2008-4401" seq="2008-4401" severity="Medium" type="CVE" published="2008-10-17" CVSS_version="2.0" CVSS_score="5.0" modified="2008-10-17">
+ <desc>
+ <descript source="cve">ActionScript in Adobe Flash Player 9.0.124.0 and earlier does not require user interaction in conjunction with (1) the FileReference.browse operation in the FileReference upload API or (2) the FileReference.download operation in the FileReference download API, which allows remote attackers to create a browse dialog box, and possibly have unspecified other impact, via an SWF file.</descript>
+ </desc>
+ <loss_types>
+ <int />
+ </loss_types>
+ <range>
+ <network />
+ </range>
+ <refs>
+ <ref source="XF" patch="1" url="http://xforce.iss.net/xforce/xfdb/45913">adobe-flash-filereference-file-upload(45913)</ref>
+ <ref source="CONFIRM" patch="1" url="http://www.adobe.com/support/security/bulletins/apsb08-18.html">http://www.adobe.com/support/security/bulletins/apsb08-18.html</ref>
+ <ref source="SECUNIA" patch="1" url="http://secunia.com/advisories/32270" adv="1">32270</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2838" adv="1">ADV-2008-2838</ref>
+ <ref source="CONFIRM" url="http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html">http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021061">1021061</ref>
+ </refs>
+ <vuln_soft>
+ <prod vendor="adobe" name="flash_player">
+ <vers num="7" />
+ <vers num="7.0" />
+ <vers num="7.0.1" />
+ <vers num="7.0.25" />
+ <vers num="7.0.63" />
+ <vers num="7.0.69.0" />
+ <vers num="7.0.70.0" />
+ <vers num="7.0_r67" />
+ <vers num="7.1" />
+ <vers num="7.1.1" />
+ <vers num="7.2" />
+ <vers num="8" />
+ <vers num="8.0" />
+ <vers num="8.0.24.0" />
+ <vers num="8.0.34.0" />
+ <vers num="8.0.35.0" />
+ <vers num="8.0.39.0" />
+ <vers num="9" />
+ <vers num="9.0.112.0" />
+ <vers num="9.0.114.0" />
+ <vers num="9.0.115.0" />
+ <vers num="9.0.124.0" prev="1" />
+ </prod>
+ </vuln_soft>
+ </entry>
+ <entry name="CVE-2008-4473" seq="2008-4473" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Multiple heap-based buffer overflows in Adobe Flash CS3 Professional on Windows and Flash MX 2004 allow remote attackers to execute arbitrary code via an SWF file containing long control parameters.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45914">adobe-flash-cs3-bo(45914)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31769">31769</ref>
+ <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497397/100/0/threaded">20081015 Multiple Flash Authoring Heap Overflows - Malformed SWF Files</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2837">ADV-2008-2837</ref>
+ <ref source="CONFIRM" url="http://www.adobe.com/support/security/advisories/apsa08-09.html">http://www.adobe.com/support/security/advisories/apsa08-09.html</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021060">1021060</ref>
+ <ref source="MISC" url="http://security-assessment.com/files/advisories/2008-10-16_Multiple_Flash_Authoring_Heap_Overflows.pdf">http://security-assessment.com/files/advisories/2008-10-16_Multiple_Flash_Authoring_Heap_Overflows.pdf</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32246">32246</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4412" seq="2008-4412" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in HP Systems Insight Manager (SIM) before 5.2 Update 2 (C.05.02.02.00) allows remote attackers to obtain sensitive information via unspecified vectors.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45916">hp-sim-unspecified-security-bypass(45916)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31777">31777</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2836">ADV-2008-2836</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32287">32287</ref>
+ <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962">SSRT080035</ref>
+ <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962">HPSBMA02378</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4593" seq="2008-4593" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Apple iPhone 2.1 with firmware 5F136, when Require Passcode is enabled and Show SMS Preview is disabled, allows physically proximate attackers to obtain sensitive information by performing an Emergency Call tap and then reading SMS messages on the device screen, aka Apple bug number 6267416.</descript>
+ </desc>
+ <refs>
+ <ref source="MISC" url="http://www.karlkraft.com/index.php/2008/10/03/yet-another-iphone-emergency-call-security-bug/">http://www.karlkraft.com/index.php/2008/10/03/yet-another-iphone-emergency-call-security-bug/</ref>
+ <ref source="SECTRACK" url="http://securitytracker.com/id?1021021">1021021</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4594" seq="2008-4594" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45842">linksys-wap4400n-unspecified(45842)</ref>
+ <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/2805">ADV-2008-2805</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32259">32259</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4595" seq="2008-4595" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Multiple unspecified vulnerabilities in Slaytanic Scripts Content Plus 2.1.1 have unknown impact and remote attack vectors.</descript>
+ </desc>
+ <refs>
+ <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=632842">http://sourceforge.net/project/shownotes.php?release_id=632842</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32245">32245</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4596" seq="2008-4596" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in Shindig-Integrator 5.x, a module for Drupal, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors in generated pages.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45925">shindigintegrator-unspecified-xss(45925)</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32285">32285</ref>
+ <ref source="CONFIRM" url="http://drupal.org/node/321758">http://drupal.org/node/321758</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4597" seq="2008-4597" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Shindig-Integrator 5.x, a module for Drupal, does not properly restrict generated page access, which allows remote attackers to gain privileges via unspecified vectors.</descript>
+ </desc>
+ <refs>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32285">32285</ref>
+ <ref source="CONFIRM" url="http://drupal.org/node/321758">http://drupal.org/node/321758</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4598" seq="2008-4598" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Unspecified vulnerability in Shindig-Integrator 5.x, a module for Drupal, has unspecified impact and remote attack vectors related to "numerous flaws" that are not related to XSS or access control, a different vulnerability than CVE-2008-4596 and CVE-2008-4597.</descript>
+ </desc>
+ <refs>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32285">32285</ref>
+ <ref source="CONFIRM" url="http://drupal.org/node/321758">http://drupal.org/node/321758</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4599" seq="2008-4599" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in category.php in Mosaic Commerce allows remote attackers to execute arbitrary SQL commands via the cid parameter.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45926">mosaiccommerce-category-sql-injection(45926)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31782">31782</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6763">6763</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4600" seq="2008-4600" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">configure.php in PokerMax Poker League Tournament Script 0.13 allows remote attackers to bypass authentication and gain administrative access by setting the ValidUserAdmin cookie.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45931">pokermax-cookie-security-bypass(45931)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31784">31784</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6766">6766</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32312">32312</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4601" seq="2008-4601" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Cross-site scripting (XSS) vulnerability in the login feature in Habari CMS 0.5.1 allows remote attackers to inject arbitrary web script or HTML via the habari_username parameter.</descript>
+ </desc>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31794">31794</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32311">32311</ref>
+ <ref source="MISC" url="http://packetstorm.linuxsecurity.com/0810-exploits/habaricms-xss.txt">http://packetstorm.linuxsecurity.com/0810-exploits/habaricms-xss.txt</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4602" seq="2008-4602" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Directory traversal vulnerability in index.php in Post Affiliate Pro 2.0 allows remote authenticated users to read and possibly execute arbitrary local files via a .. (dot dot) in the md parameter.</descript>
+ </desc>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31796">31796</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6772">6772</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4603" seq="2008-4603" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in search.php in iGaming CMS 2.0 Alpha 1 allows remote attackers to execute arbitrary SQL commands via the keywords parameter in a search_games action.</descript>
+ </desc>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31793">31793</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6769">6769</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4604" seq="2008-4604" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in index.php in Easy CafeEngine 1.1 allows remote attackers to execute arbitrary SQL commands via the itemid parameter.</descript>
+ </desc>
+ <refs>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31788">31788</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6762">6762</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32307">32307</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4605" seq="2008-4605" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">SQL injection vulnerability in CafeEngine allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) dish.php and (2) menu.php.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45929">cafeengine-dish-menu-sql-injection(45929)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31786">31786</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6762">6762</ref>
+ <ref source="SECUNIA" url="http://secunia.com/advisories/32308">32308</ref>
+ </refs>
+ </entry>
+ <entry name="CVE-2008-4606" seq="2008-4606" type="CVE" published="2008-10-17" modified="2008-10-17">
+ <desc>
+ <descript source="cve">Multiple SQL injection vulnerabilities in IP Reg 0.4 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) location_id parameter to locationdel.php and (2) vlan_id parameter to it.php. NOTE: the vlanview.php and vlandel.php vectors are already covered by CVE-2007-6579.</descript>
+ </desc>
+ <refs>
+ <ref source="XF" url="http://xforce.iss.net/xforce/xfdb/45934">ipreg-locationid-vlanid-sql-injection(45934)</ref>
+ <ref source="BID" url="http://www.securityfocus.com/bid/31781">31781</ref>
+ <ref source="MILW0RM" url="http://www.milw0rm.com/exploits/6765">6765</ref>
+ </refs>
+ </entry>
+
+</nvd> \ No newline at end of file
diff --git a/libxml2/test/schemas/nvdcve_0.xsd b/libxml2/test/schemas/nvdcve_0.xsd
new file mode 100644
index 0000000..f24b574
--- /dev/null
+++ b/libxml2/test/schemas/nvdcve_0.xsd
@@ -0,0 +1,498 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://nvd.nist.gov/feeds/cve/1.2"
+ xmlns:cve="http://nvd.nist.gov/feeds/cve/1.2"
+ elementFormDefault="qualified" attributeFormDefault="unqualified"
+ version="1.2">
+ <xs:annotation>
+ <xs:documentation>This schema defines the structure of the National
+ Vulnerability Database XML feed files version: 1.2. The elements and
+ attribute in this document are described by xs:annotation tags. This
+ file is kept at http://nvd.nist.gov/schema/nvdcve.xsd. The NVD XML
+ feeds are available at http://nvd.nist.gov/download.cfm.
+
+ Release Notes:
+
+ Version 1.2:
+ * CVSS version 2 scores and vectors have been added. Please see
+ http://nvd.nist.gov/cvss.cfm?vectorinfo and
+ http://www.first.org/cvss/cvss-guide.html for more information on
+ how to interpret this data. </xs:documentation>
+ </xs:annotation>
+ <xs:element name="nvd">
+ <xs:annotation>
+ <xs:documentation>The root element of the NVD CVE feed. Multiple "entry" child elements describe specific NVD CVE entries.</xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="cve:entry" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute name="nvd_xml_version" type="xs:NMTOKEN" use="required">
+ <xs:annotation>
+ <xs:documentation>The schema version number supported by the feed.</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="pub_date" type="cve:dateType" use="required">
+ <xs:annotation>
+ <xs:documentation>The date the feed was generated.</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="entry" type="cve:entryType">
+ <xs:annotation>
+ <xs:documentation>A CVE entry.</xs:documentation>
+ </xs:annotation>
+ </xs:element>
+
+ <!-- ******************************************************************* -->
+ <!-- * Complex Types * -->
+ <!-- ******************************************************************* -->
+ <xs:complexType name="entryType">
+ <xs:annotation>
+ <xs:documentation> Documents one CVE entry. The child elements should always
+ appear in the sequence defined below. These elements are compatible with
+ entry elements from the CVE XML feeds.</xs:documentation>
+ </xs:annotation>
+ <xs:sequence>
+ <xs:element name="desc">
+ <xs:annotation>
+ <xs:documentation>Description wrapper tag, parent to any
+ documented descriptions of this CVE entry. While the "desc"
+ tag will always be present, there may be no "descript" child
+ tags. Only one "descript" tag will exist for each
+ description source (i.e. CVE, NVD, ...). </xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="descript" type="cve:descriptType" minOccurs="0" maxOccurs="2">
+ <xs:annotation>
+ <xs:documentation>A description of a CVE entry
+ from the source indicated by the "source"
+ attribute.</xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="impacts" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Impact wrapper tag (may or may not be
+ present). Only one "impact" tag will exist for each impact
+ explanation source. </xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="impact" type="cve:impactType">
+ <xs:annotation>
+ <xs:documentation> Contains a specific impact
+ explanation of this CVE entry from source
+ indicated by the "source" attribute.
+ </xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="sols" type="cve:solsType" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Solution wrapper tag (may or may not be
+ present). Only one "sol" tag will exist for each solution
+ explanation source. </xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ <xs:element name="loss_types" type="cve:lossTypeType" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Loss type tag (may or may not be present).
+ Contains one loss type child for each loss type of this CVE
+ entry. Potential loss types are: "avail" => availability
+ "conf" => confidentiality "int" => integrity "sec_prot" =>
+ security protection </xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ <xs:element name="vuln_types" type="cve:vulnType" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Vulnerability type tag (may or may not be
+ present). Contains one vulnerability type child for each
+ vulnerability type of this CVE entry. Potential
+ vulnerability types are: "access" => Access validation error
+ "input" => Input validation error "design" => Design error
+ "exception" => Exceptional condition error "env" =>
+ Environmental error "config" => Configuration error "race"
+ => Race condition error "other" => other </xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ <xs:element name="range" type="cve:rangeType" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Vulnerability range tag (may or may not be
+ present). Contains one vulnerability range child for each
+ vulnerability range of this CVE entry. Potential
+ vulnerability ranges are: "local" => Locally exploitable
+ "local_network" => Local network exploitable "network" =>
+ Network exploitable "user_init" => User accesses attacker
+ </xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ <xs:element name="refs">
+ <xs:annotation>
+ <xs:documentation> Reference wrapper tag (always present).
+ External references to this CVE entry are contained within
+ this tag. </xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="ref" type="cve:refType" minOccurs="0" maxOccurs="unbounded">
+ <xs:annotation>
+ <xs:documentation> Individual reference to this CVE
+ entry. Text is the name of this vulnerability at
+ this particular reference. Attributes: "source"
+ (required) => Name of reference source "url"
+ (required) => hyperlink to reference "sig" =>
+ indicates this reference includes a tool
+ signature "adv" => indicates this reference is a
+ Security Advisory "patch" => indicates this
+ reference includes a patch for this
+ vulnerability </xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="vuln_soft" type="cve:vulnSoftType" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Vulnerable software wrapper tag (may or may
+ not be present). Software affected by this CVE entry are
+ listed within this tag. </xs:documentation>
+ </xs:annotation>
+ </xs:element>
+ </xs:sequence>
+ <xs:attribute name="type" use="required">
+ <xs:annotation>
+ <xs:documentation>CVE or CAN</xs:documentation>
+ </xs:annotation>
+ <xs:simpleType>
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:enumeration value="CAN"/>
+ <xs:enumeration value="CVE"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ <xs:attribute name="name" use="required">
+ <xs:annotation>
+ <xs:documentation>the full CVE name</xs:documentation>
+ </xs:annotation>
+ <xs:simpleType>
+ <xs:restriction base="xs:ID">
+ <xs:pattern value="(CAN|CVE)\-\d\d\d\d\-\d\d\d\d"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ <xs:attribute name="seq" use="required">
+ <xs:annotation>
+ <xs:documentation>the sequence number from CVE name</xs:documentation>
+ </xs:annotation>
+ <xs:simpleType>
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:pattern value="\d\d\d\d\-\d\d\d\d"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ <xs:attribute name="nvd_name" type="xs:string">
+ <xs:annotation>
+ <xs:documentation>the NVD name (if it exists)</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="discovered" type="cve:dateType">
+ <xs:annotation>
+ <xs:documentation>the date this entry was discovered</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="published" type="cve:dateType" use="required">
+ <xs:annotation>
+ <xs:documentation>the date this entry was published</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="modified" type="cve:dateType">
+ <xs:annotation>
+ <xs:documentation>the date this entry was last modified</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="severity">
+ <xs:annotation>
+ <xs:documentation>the entry's severity as determined by the NVD analysts: High, Medium, or Low</xs:documentation>
+ </xs:annotation>
+ <xs:simpleType>
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:enumeration value="High"/>
+ <xs:enumeration value="Medium"/>
+ <xs:enumeration value="Low"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+ <xs:attribute name="reject" type="cve:trueOnlyAttribute">
+ <xs:annotation>
+ <xs:documentation>indicates that this CVE entry has been rejected by CVE or NVD</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="CVSS_version" type="xs:string">
+ <xs:annotation>
+ <xs:documentation>the CVSS Version Indicator</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="CVSS_score" type="cve:zeroToTen">
+ <xs:annotation>
+ <xs:documentation>Same as the CVSS_base_score to provide backwards compatability with the previous CVE XML feed format. This field is deprecated an may be removed at a future date.</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="CVSS_base_score" type="cve:zeroToTen">
+ <xs:annotation>
+ <xs:documentation>CVSS version 2 Base Score</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="CVSS_impact_subscore" type="cve:zeroToTen">
+ <xs:annotation>
+ <xs:documentation>CVSS version 2 Impact Score</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="CVSS_exploit_subscore" type="cve:zeroToTen">
+ <xs:annotation>
+ <xs:documentation>CVSS version 2 Exploit Score</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ <xs:attribute name="CVSS_vector" type="cve:CVSSVector">
+ <xs:annotation>
+ <xs:documentation>the CVSS version 2 Vector string</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ </xs:complexType>
+
+ <xs:complexType name="descriptType">
+ <xs:simpleContent>
+ <xs:extension base="xs:string">
+ <xs:attribute name="source" type="cve:descriptSourceType" use="required">
+ <xs:annotation>
+ <xs:documentation>The source of the CVE description.</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+
+ <xs:complexType name="impactType">
+ <xs:simpleContent>
+ <xs:extension base="xs:string">
+ <xs:attribute name="source" type="cve:impactSourceType" use="required">
+ </xs:attribute>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+
+ <xs:complexType name="vulnType">
+ <xs:sequence>
+ <xs:element name="access" minOccurs="0"/>
+ <xs:element name="input" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Input validation error tag with
+ one attribute for each input validation error
+ type. Potential input validation error types
+ are: "bound" => Boundary condition error
+ "buffer" => Buffer overflow </xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:attribute name="bound" type="cve:trueOnlyAttribute"/>
+ <xs:attribute name="buffer" type="cve:trueOnlyAttribute"
+ />
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="design" minOccurs="0"/>
+ <xs:element name="exception" minOccurs="0"/>
+ <xs:element name="env" minOccurs="0"/>
+ <xs:element name="config" minOccurs="0"/>
+ <xs:element name="race" minOccurs="0"/>
+ <xs:element name="other" minOccurs="0"/>
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:complexType name="solsType">
+ <xs:sequence>
+ <xs:element name="sol">
+ <xs:annotation>
+ <xs:documentation> Contains a specific solution
+ explanation of this CVE entry from source
+ indicated by the "source" attribute.
+ </xs:documentation>
+ </xs:annotation>
+ <xs:complexType mixed="true">
+ <xs:simpleContent>
+ <xs:extension base="xs:string">
+ <xs:attribute name="source" type="cve:solsSourceType" use="required">
+ </xs:attribute>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:complexType name="lossTypeType">
+ <xs:sequence>
+ <xs:element name="avail" minOccurs="0"/>
+ <xs:element name="conf" minOccurs="0"/>
+ <xs:element name="int" minOccurs="0"/>
+ <xs:element name="sec_prot" minOccurs="0">
+ <xs:annotation>
+ <xs:documentation> Security Protection tag with one
+ attribute for each security protection type.
+ Potential security protection types are: "admin"
+ => gain administrative access "user" => gain
+ user access "other" => other </xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:attribute name="admin" type="cve:trueOnlyAttribute"/>
+ <xs:attribute name="user" type="cve:trueOnlyAttribute"/>
+ <xs:attribute name="other" type="cve:trueOnlyAttribute"
+ />
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:complexType name="rangeType">
+ <xs:sequence>
+ <xs:element name="local" minOccurs="0"/>
+ <xs:element name="local_network" minOccurs="0"/>
+ <xs:element name="network" minOccurs="0"/>
+ <xs:element name="user_init" minOccurs="0"/>
+ </xs:sequence>
+ </xs:complexType>
+
+ <xs:complexType name="refType">
+ <xs:simpleContent>
+ <xs:extension base="xs:string">
+ <xs:attribute name="source" type="xs:string" use="required"/>
+ <xs:attribute name="url" type="cve:urlType" use="required"/>
+ <xs:attribute name="sig" type="cve:trueOnlyAttribute"/>
+ <xs:attribute name="adv" type="cve:trueOnlyAttribute"/>
+ <xs:attribute name="patch" type="cve:trueOnlyAttribute"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+
+ <xs:complexType name="vulnSoftType">
+ <xs:sequence>
+ <xs:element name="prod" maxOccurs="unbounded">
+ <xs:annotation>
+ <xs:documentation> Product wrapper tag. Versions of
+ this product that are affected by this
+ vulnerability are listed within this tag.
+ Attributes: "name" => Product name "vendor" =>
+ Vendor of this product </xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="vers" maxOccurs="unbounded">
+ <xs:annotation>
+ <xs:documentation> Represents a version
+ of this product that is affected by
+ this vulnerability. Attributes:
+ "num" => This version number "prev"
+ => Indicates that versions previous
+ to this version number are also
+ affected by this vulnerability
+ "edition" => Indicates the edition
+ associated with the version number
+ </xs:documentation>
+ </xs:annotation>
+ <xs:complexType>
+ <xs:attribute name="num"
+ type="xs:string" use="required"/>
+ <xs:attribute name="prev"
+ type="cve:trueOnlyAttribute"/>
+ <xs:attribute name="edition"
+ type="xs:string"/>
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ <xs:attribute name="name" type="xs:string"
+ use="required"/>
+ <xs:attribute name="vendor" type="xs:string"
+ use="required"/>
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+
+ <!-- ******************************************************************* -->
+ <!-- * Simple Types * -->
+ <!-- ******************************************************************* -->
+ <xs:simpleType name="descriptSourceType">
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:enumeration value="cve"/>
+ <xs:enumeration value="nvd"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="impactSourceType">
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:enumeration value="nvd"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="solsSourceType">
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:enumeration value="nvd"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="dateType">
+ <xs:annotation>
+ <xs:documentation> Defines date format for NVD. Dates follow the mask "yyyy-mm-dd"
+ </xs:documentation>
+ </xs:annotation>
+ <xs:restriction base="xs:string">
+ <xs:pattern
+ value="(19|20)\d\d-((01|03|05|07|08|10|12)-(0[1-9]|[1-2]\d|3[01])|(04|06|09|11)-(0[1-9]|[1-2]\d|30)|02-(0[1-9]|1\d|2\d))"
+ />
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="urlType">
+ <xs:annotation>
+ <xs:documentation> Restricts urls in NVD beyond the xs:anyURI restrictions.
+ </xs:documentation>
+ </xs:annotation>
+ <xs:restriction base="xs:anyURI">
+ <xs:whiteSpace value="collapse"/>
+ <xs:pattern value="(news|(ht|f)tp(s)?)://.+"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="trueOnlyAttribute">
+ <xs:annotation>
+ <xs:documentation> simpleType used for attributes that are only present when they are
+ true. Such attributes appear only in the form attribute_name="1".
+ </xs:documentation>
+ </xs:annotation>
+ <xs:restriction base="xs:NMTOKEN">
+ <xs:enumeration value="1"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="zeroToTen">
+ <xs:annotation>
+ <xs:documentation> simpleType used when scoring on a scale of 0-10, inclusive
+ </xs:documentation>
+ </xs:annotation>
+ <xs:restriction base="xs:decimal">
+ <xs:minInclusive value="0" fixed="true"/>
+ <xs:maxInclusive value="10" fixed="true"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="CVSSVector">
+ <xs:annotation>
+ <xs:documentation>simpleType to describe the CVSS Base Vector </xs:documentation>
+ </xs:annotation>
+ <xs:restriction base="xs:string">
+ <xs:pattern
+ value="\(AV:[LAN]/AC:[HML]/Au:[NSM]/C:[NPC]/I:[NPC]/A:[NPC]\)"/>
+ </xs:restriction>
+ </xs:simpleType>
+</xs:schema>
diff --git a/libxml2/test/schemas/po0_0.xml b/libxml2/test/schemas/po0_0.xml
new file mode 100644
index 0000000..387232d
--- /dev/null
+++ b/libxml2/test/schemas/po0_0.xml
@@ -0,0 +1,32 @@
+<?xml version="1.0"?>
+<purchaseOrder orderDate="1999-10-20">
+ <shipTo country="US">
+ <name>Alice Smith</name>
+ <street>123 Maple Street</street>
+ <city>Mill Valley</city>
+ <state>CA</state>
+ <zip>90952</zip>
+ </shipTo>
+ <billTo country="US">
+ <name>Robert Smith</name>
+ <street>8 Oak Avenue</street>
+ <city>Old Town</city>
+ <state>PA</state>
+ <zip>95819</zip>
+ </billTo>
+ <comment>Hurry, my lawn is going wild!</comment>
+ <items>
+ <item partNum="872-AA">
+ <productName>Lawnmower</productName>
+ <quantity>1</quantity>
+ <USPrice>148.95</USPrice>
+ <comment>Confirm this is electric</comment>
+ </item>
+ <item partNum="926-AA">
+ <productName>Baby Monitor</productName>
+ <quantity>1</quantity>
+ <USPrice>39.98</USPrice>
+ <shipDate>1999-05-21</shipDate>
+ </item>
+ </items>
+</purchaseOrder>
diff --git a/libxml2/test/schemas/po0_0.xsd b/libxml2/test/schemas/po0_0.xsd
new file mode 100644
index 0000000..5a1e660
--- /dev/null
+++ b/libxml2/test/schemas/po0_0.xsd
@@ -0,0 +1,59 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:annotation>
+ <xsd:documentation xml:lang="en">
+Purchase order schema for Example.com.
+ Copyright 2000 Example.com. All rights reserved.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:element name="purchaseOrder" type="PurchaseOrderType"/>
+ <xsd:element name="comment" type="xsd:string"/>
+ <xsd:complexType name="PurchaseOrderType">
+ <xsd:sequence>
+ <xsd:element name="shipTo" type="USAddress"/>
+ <xsd:element name="billTo" type="USAddress"/>
+ <xsd:element ref="comment" minOccurs="0"/>
+ <xsd:element name="items" type="Items"/>
+ </xsd:sequence>
+ <xsd:attribute name="orderDate" type="xsd:date"/>
+ </xsd:complexType>
+ <xsd:complexType name="USAddress">
+ <xsd:sequence>
+ <xsd:element name="name" type="xsd:string"/>
+ <xsd:element name="street" type="xsd:string"/>
+ <xsd:element name="city" type="xsd:string"/>
+ <xsd:element name="state" type="xsd:string"/>
+ <xsd:element name="zip" type="xsd:decimal"/>
+ </xsd:sequence>
+ <xsd:attribute name="country" type="xsd:NMTOKEN" fixed="US"/>
+ </xsd:complexType>
+ <xsd:complexType name="Items">
+ <xsd:sequence>
+ <xsd:element name="item" minOccurs="0" maxOccurs="unbounded">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="productName" type="xsd:string"/>
+ <xsd:element name="quantity">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:positiveInteger">
+ <xsd:maxExclusive value="100"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="USPrice" type="xsd:decimal"/>
+ <xsd:element ref="comment" minOccurs="0"/>
+ <xsd:element name="shipDate" type="xsd:date" minOccurs="0"/>
+ </xsd:sequence>
+ <xsd:attribute name="partNum" type="SKU" use="required"/>
+ </xsd:complexType>
+ </xsd:element>
+ </xsd:sequence>
+ </xsd:complexType>
+<!-- Stock Keeping Unit, a code for identifying products -->
+ <xsd:simpleType name="SKU">
+ <xsd:restriction base="xsd:string">
+ <xsd:pattern value="\d{3}-[A-Z]{2}"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+</xsd:schema>
+
diff --git a/libxml2/test/schemas/po1_0.xml b/libxml2/test/schemas/po1_0.xml
new file mode 100644
index 0000000..8781bbf
--- /dev/null
+++ b/libxml2/test/schemas/po1_0.xml
@@ -0,0 +1,34 @@
+<?xml version="1.0"?>
+<apo:purchaseOrder xmlns:apo="http://www.example.com/PO1"
+ orderDate="1999-10-20">
+ <shipTo country="US">
+ <name>Alice Smith</name>
+ <street>123 Maple Street</street>
+ <city>Mill Valley</city>
+ <state>CA</state>
+ <zip>90952</zip>
+ </shipTo>
+ <billTo country="US">
+ <name>Robert Smith</name>
+ <street>8 Oak Avenue</street>
+ <city>Old Town</city>
+ <state>PA</state>
+ <zip>95819</zip>
+ </billTo>
+ <apo:comment>Hurry, my lawn is going wild!</apo:comment>
+ <items>
+ <item partNum="872-AA">
+ <productName>Lawnmower</productName>
+ <quantity>1</quantity>
+ <USPrice>148.95</USPrice>
+ <apo:comment>Confirm this is electric</apo:comment>
+ </item>
+ <item partNum="926-AA">
+ <productName>Baby Monitor</productName>
+ <quantity>1</quantity>
+ <USPrice>39.98</USPrice>
+ <shipDate>1999-05-21</shipDate>
+ </item>
+ </items>
+</apo:purchaseOrder>
+
diff --git a/libxml2/test/schemas/po1_0.xsd b/libxml2/test/schemas/po1_0.xsd
new file mode 100644
index 0000000..a630561
--- /dev/null
+++ b/libxml2/test/schemas/po1_0.xsd
@@ -0,0 +1,64 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ xmlns:po="http://www.example.com/PO1"
+ targetNamespace="http://www.example.com/PO1"
+ elementFormDefault="unqualified"
+ attributeFormDefault="unqualified">
+ <xsd:annotation>
+ <xsd:documentation xml:lang="en">
+Purchase order schema for Example.com.
+ Copyright 2000 Example.com. All rights reserved.
+ </xsd:documentation>
+ </xsd:annotation>
+ <xsd:element name="purchaseOrder" type="po:PurchaseOrderType"/>
+ <xsd:element name="comment" type="xsd:string"/>
+ <xsd:complexType name="PurchaseOrderType">
+ <xsd:sequence>
+ <xsd:element name="shipTo" type="po:USAddress"/>
+ <xsd:element name="billTo" type="po:USAddress"/>
+ <xsd:element ref="po:comment" minOccurs="0"/>
+ <xsd:element name="items" type="po:Items"/>
+ </xsd:sequence>
+ <xsd:attribute name="orderDate" type="xsd:date"/>
+ </xsd:complexType>
+ <xsd:complexType name="USAddress">
+ <xsd:sequence>
+ <xsd:element name="name" type="xsd:string"/>
+ <xsd:element name="street" type="xsd:string"/>
+ <xsd:element name="city" type="xsd:string"/>
+ <xsd:element name="state" type="xsd:string"/>
+ <xsd:element name="zip" type="xsd:decimal"/>
+ </xsd:sequence>
+ <xsd:attribute name="country" type="xsd:NMTOKEN" fixed="US"/>
+ </xsd:complexType>
+ <xsd:complexType name="Items">
+ <xsd:sequence>
+ <xsd:element name="item" minOccurs="0" maxOccurs="unbounded">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="productName" type="xsd:string"/>
+ <xsd:element name="quantity">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:positiveInteger">
+ <xsd:maxExclusive value="100"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:element>
+ <xsd:element name="USPrice" type="xsd:decimal"/>
+ <xsd:element ref="po:comment" minOccurs="0"/>
+ <xsd:element name="shipDate" type="xsd:date" minOccurs="0"/>
+ </xsd:sequence>
+ <xsd:attribute name="partNum" type="po:SKU" use="required"/>
+ </xsd:complexType>
+ </xsd:element>
+ </xsd:sequence>
+ </xsd:complexType>
+<!-- Stock Keeping Unit, a code for identifying products -->
+ <xsd:simpleType name="SKU">
+ <xsd:restriction base="xsd:string">
+ <xsd:pattern value="\d{3}-[A-Z]{2}"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+</xsd:schema>
+
+
diff --git a/libxml2/test/schemas/poschargrp0_0.xml b/libxml2/test/schemas/poschargrp0_0.xml
new file mode 100644
index 0000000..0800b1b
--- /dev/null
+++ b/libxml2/test/schemas/poschargrp0_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="utf-8"?>
+<testElem xmlns="http://obj-sys.com/mySchema">value</testElem> \ No newline at end of file
diff --git a/libxml2/test/schemas/poschargrp0_0.xsd b/libxml2/test/schemas/poschargrp0_0.xsd
new file mode 100644
index 0000000..3243a2f
--- /dev/null
+++ b/libxml2/test/schemas/poschargrp0_0.xsd
@@ -0,0 +1,14 @@
+<?xml version="1.0" encoding="utf-8" ?>
+<xs:schema targetNamespace="http://obj-sys.com/mySchema"
+ xmlns:elementFormDefault="qualified"
+ xmlns="http://obj-sys.com/mySchema"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:element name="testElem">
+ <xs:simpleType>
+ <xs:restriction base="xs:string">
+ <xs:pattern value="[^.:/]+"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:element>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/regexp-char-ref_0.xml b/libxml2/test/schemas/regexp-char-ref_0.xml
new file mode 100644
index 0000000..f6f463e
--- /dev/null
+++ b/libxml2/test/schemas/regexp-char-ref_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+
+<test test1="5"
+ test2="6"
+ test3="#"
+ test4=";"
+ test5="&amp;" />
diff --git a/libxml2/test/schemas/regexp-char-ref_0.xsd b/libxml2/test/schemas/regexp-char-ref_0.xsd
new file mode 100644
index 0000000..2d91c6c
--- /dev/null
+++ b/libxml2/test/schemas/regexp-char-ref_0.xsd
@@ -0,0 +1,20 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:element name="test">
+ <xs:complexType>
+ <xs:attribute name="test1" type="myType"/>
+ <xs:attribute name="test2" type="myType"/>
+ <xs:attribute name="test3" type="myType"/>
+ <xs:attribute name="test4" type="myType"/>
+ <xs:attribute name="test5" type="myType"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:simpleType name="myType">
+ <xs:restriction base="xs:string">
+ <xs:pattern value="[56;&amp;#]"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/regexp-char-ref_1.xsd b/libxml2/test/schemas/regexp-char-ref_1.xsd
new file mode 100644
index 0000000..598a4d5
--- /dev/null
+++ b/libxml2/test/schemas/regexp-char-ref_1.xsd
@@ -0,0 +1,20 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:element name="test">
+ <xs:complexType>
+ <xs:attribute name="test1" type="myType"/>
+ <xs:attribute name="test2" type="myType"/>
+ <xs:attribute name="test3" type="myType"/>
+ <xs:attribute name="test4" type="myType"/>
+ <xs:attribute name="test5" type="myType"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:simpleType name="myType">
+ <xs:restriction base="xs:string">
+ <xs:pattern value="[&amp;#65;]"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/restrict-CT-attr-ref_0.xml b/libxml2/test/schemas/restrict-CT-attr-ref_0.xml
new file mode 100644
index 0000000..d021a83
--- /dev/null
+++ b/libxml2/test/schemas/restrict-CT-attr-ref_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0"?>
+<foo:foo xmlns:foo="http://FOO" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO restrict-CT-attr-ref_0.xsd" foo:id="b0836217462"/> \ No newline at end of file
diff --git a/libxml2/test/schemas/restrict-CT-attr-ref_0.xsd b/libxml2/test/schemas/restrict-CT-attr-ref_0.xsd
new file mode 100644
index 0000000..a98b82a
--- /dev/null
+++ b/libxml2/test/schemas/restrict-CT-attr-ref_0.xsd
@@ -0,0 +1,30 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ attributeFormDefault="qualified"
+ xmlns:foo="http://FOO"
+ targetNamespace="http://FOO">
+
+ <xsd:attribute name="id" type="xsd:ID"/>
+
+ <xsd:complexType name="typeIDAttr">
+ <xsd:attribute ref="foo:id"/>
+ </xsd:complexType>
+
+ <xsd:simpleType name="fooID">
+ <xsd:restriction base="xsd:ID">
+ <xsd:pattern value="b\d{10}"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:complexContent>
+ <xsd:restriction base="foo:typeIDAttr">
+ <xsd:attribute name="id" type="foo:fooID"/>
+ </xsd:restriction>
+ </xsd:complexContent>
+ </xsd:complexType>
+ </xsd:element>
+
+
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/restriction-attr1_0.xml b/libxml2/test/schemas/restriction-attr1_0.xml
new file mode 100644
index 0000000..33b8f19
--- /dev/null
+++ b/libxml2/test/schemas/restriction-attr1_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0"?>
+<foo xmlns="http://FOO" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO file:///l:/libxml2/test/schemas/restriction-attr1_0.xsd" barA="hh"/>
diff --git a/libxml2/test/schemas/restriction-attr1_0.xsd b/libxml2/test/schemas/restriction-attr1_0.xsd
new file mode 100644
index 0000000..31c288f
--- /dev/null
+++ b/libxml2/test/schemas/restriction-attr1_0.xsd
@@ -0,0 +1,18 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="http://FOO" targetNamespace="http://FOO">
+
+ <xs:element name="foo">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="typeA">
+ <xs:attribute name="barA" type="xs:string" use="optional"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:complexType name="typeA">
+ <xs:attribute name="barA" type="xs:string" use="required"/>
+ </xs:complexType>
+
+</xs:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/restriction-enum-1_0.xml b/libxml2/test/schemas/restriction-enum-1_0.xml
new file mode 100644
index 0000000..9bdb4a3
--- /dev/null
+++ b/libxml2/test/schemas/restriction-enum-1_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<!-- This instance should raise an error, since in
+ "restriction-enum-1_1.xsd", the restricting enumeration
+ rules out the value "c" (which is allowed in the restricted
+ type).
+-->
+<foo>c</foo>
diff --git a/libxml2/test/schemas/restriction-enum-1_1.xsd b/libxml2/test/schemas/restriction-enum-1_1.xsd
new file mode 100644
index 0000000..69e353d
--- /dev/null
+++ b/libxml2/test/schemas/restriction-enum-1_1.xsd
@@ -0,0 +1,19 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:simpleType name="fooType">
+ <xs:restriction base="xs:string">
+ <xs:enumeration value="a"/>
+ <xs:enumeration value="b"/>
+ <xs:enumeration value="c"/>
+ <xs:enumeration value="d"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="barType">
+ <xs:restriction base="fooType">
+ <xs:enumeration value="a"/>
+ <xs:enumeration value="b"/>
+ <xs:enumeration value="d"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:element name="foo" type="barType" />
+</xs:schema>
diff --git a/libxml2/test/schemas/restriction0_0.xml b/libxml2/test/schemas/restriction0_0.xml
new file mode 100644
index 0000000..8656d2c
--- /dev/null
+++ b/libxml2/test/schemas/restriction0_0.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0"?>
+<who>
+ <forename>Bill</forename>
+ <surname>Clinton</surname>
+</who>
diff --git a/libxml2/test/schemas/restriction0_0.xsd b/libxml2/test/schemas/restriction0_0.xsd
new file mode 100644
index 0000000..6b35b9f
--- /dev/null
+++ b/libxml2/test/schemas/restriction0_0.xsd
@@ -0,0 +1,21 @@
+<?xml version="1.0"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:complexType name="personName">
+ <xs:sequence>
+ <xs:element name="title" minOccurs="0"/>
+ <xs:element name="forename" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element name="surname"/>
+ </xs:sequence>
+ </xs:complexType>
+ <xs:complexType name="simpleName">
+ <xs:complexContent>
+ <xs:restriction base="personName">
+ <xs:sequence>
+ <xs:element name="forename" minOccurs="1" maxOccurs="1"/>
+ <xs:element name="surname"/>
+ </xs:sequence>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ <xs:element name="who" type="simpleName"/>
+</xs:schema>
diff --git a/libxml2/test/schemas/scc-no-xmlns_0.xml b/libxml2/test/schemas/scc-no-xmlns_0.xml
new file mode 100644
index 0000000..b85cdcb
--- /dev/null
+++ b/libxml2/test/schemas/scc-no-xmlns_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://foo"/>
+
diff --git a/libxml2/test/schemas/scc-no-xmlns_0.xsd b/libxml2/test/schemas/scc-no-xmlns_0.xsd
new file mode 100644
index 0000000..731c81b
--- /dev/null
+++ b/libxml2/test/schemas/scc-no-xmlns_0.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- C.4 Schema Component Constraints: no-xmlns -->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo">
+ <complexType>
+ <attribute name="xmlns" type="string" />
+ </complexType>
+ </element>
+
+</schema>
diff --git a/libxml2/test/schemas/scc-no-xsi_0.xml b/libxml2/test/schemas/scc-no-xsi_0.xml
new file mode 100644
index 0000000..b85cdcb
--- /dev/null
+++ b/libxml2/test/schemas/scc-no-xsi_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://foo"/>
+
diff --git a/libxml2/test/schemas/scc-no-xsi_0.xsd b/libxml2/test/schemas/scc-no-xsi_0.xsd
new file mode 100644
index 0000000..388b6a9
--- /dev/null
+++ b/libxml2/test/schemas/scc-no-xsi_0.xsd
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.6 Schema Component Constraint: xsi: Not Allowed -->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://www.w3.org/2001/XMLSchema-instance">
+
+ <element name="foo">
+ <complexType>
+ <attribute name="bar" form="qualified" type="string"/>
+ </complexType>
+ </element>
+
+</schema>
diff --git a/libxml2/test/schemas/seq-dubl-elem1_0.xml b/libxml2/test/schemas/seq-dubl-elem1_0.xml
new file mode 100644
index 0000000..a93c8ee
--- /dev/null
+++ b/libxml2/test/schemas/seq-dubl-elem1_0.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0"?>
+<foo:foo xmlns:foo="http://FOO"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://FOO seq-dubl-elem1_0.xsd">
+ <foo:PGPKeyID>PEhlbGxvIHdvcmxkIT4=</foo:PGPKeyID>
+ <foo:PGPKeyPacket>PEhlbGxvIHdvcmxkIT4=</foo:PGPKeyPacket>
+</foo:foo> \ No newline at end of file
diff --git a/libxml2/test/schemas/seq-dubl-elem1_0.xsd b/libxml2/test/schemas/seq-dubl-elem1_0.xsd
new file mode 100644
index 0000000..fd05da7
--- /dev/null
+++ b/libxml2/test/schemas/seq-dubl-elem1_0.xsd
@@ -0,0 +1,25 @@
+<?xml version="1.0"?>
+<schema xmlns="http://www.w3.org/2001/XMLSchema"
+ xmlns:foo="http://FOO"
+ targetNamespace="http://FOO" version="0.1"
+ elementFormDefault="qualified">
+
+ <complexType name="fooType">
+ <choice>
+ <sequence>
+ <element name="PGPKeyID" type="base64Binary"/>
+ <element name="PGPKeyPacket" type="base64Binary" minOccurs="0"/>
+ <any namespace="##other" processContents="lax" minOccurs="0"
+maxOccurs="unbounded"/>
+ </sequence>
+ <sequence>
+ <element name="PGPKeyPacket" type="base64Binary"/>
+ <any namespace="##other" processContents="lax" minOccurs="0"
+maxOccurs="unbounded"/>
+ </sequence>
+ </choice>
+ </complexType>
+
+ <element name="foo" type="foo:fooType"/>
+
+</schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/seq0_0.xml b/libxml2/test/schemas/seq0_0.xml
new file mode 100644
index 0000000..54b1c1c
--- /dev/null
+++ b/libxml2/test/schemas/seq0_0.xml
@@ -0,0 +1,61 @@
+<doc>
+ <!-- at least one present -->
+ <z-o>
+ <b/>
+ </z-o>
+ <o-o>
+ <c/>
+ </o-o>
+ <z-u>
+ <d/>
+ </z-u>
+ <o-u>
+ <e/>
+ </o-u>
+ <z-3>
+ <f/>
+ </z-3>
+ <o-3>
+ <g/>
+ </o-3>
+ <!-- more than one present when allowed -->
+ <z-o>
+ <b/>
+ </z-o>
+ <o-o>
+ <c/>
+ </o-o>
+ <z-u>
+ <d/>
+ <d/>
+ <d/>
+ </z-u>
+ <o-u>
+ <e/>
+ <e/>
+ <e/>
+ </o-u>
+ <z-3>
+ <f/>
+ <f/>
+ <f/>
+ </z-3>
+ <o-3>
+ <g/>
+ <g/>
+ <g/>
+ </o-3>
+ <!-- min 0 are not present -->
+ <z-o/>
+ <o-o>
+ <c/>
+ </o-o>
+ <z-u/>
+ <o-u>
+ <e/>
+ </o-u>
+ <z-3/>
+ <o-3>
+ <g/>
+ </o-3>
+</doc>
diff --git a/libxml2/test/schemas/seq0_0.xsd b/libxml2/test/schemas/seq0_0.xsd
new file mode 100644
index 0000000..34d3a78
--- /dev/null
+++ b/libxml2/test/schemas/seq0_0.xsd
@@ -0,0 +1,64 @@
+<?xml version="1.0"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema">
+ <xsd:annotation>
+ <xsd:documentation>
+ Testing min and max occurance attributes on sequences
+ </xsd:documentation>
+ </xsd:annotation>
+
+ <xsd:element name="doc">
+ <xsd:complexType>
+ <xsd:sequence minOccurs='0' maxOccurs='unbounded'>
+
+ <xsd:element name="z-o">
+ <xsd:complexType>
+ <xsd:sequence minOccurs='0' maxOccurs='1'>
+ <xsd:element name='b'/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="o-o">
+ <xsd:complexType>
+ <xsd:sequence minOccurs='1' maxOccurs='1'>
+ <xsd:element name='c'/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="z-u">
+ <xsd:complexType>
+ <xsd:sequence minOccurs='0' maxOccurs='unbounded'>
+ <xsd:element name='d'/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="o-u">
+ <xsd:complexType>
+ <xsd:sequence minOccurs='1' maxOccurs='unbounded'>
+ <xsd:element name='e'/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="z-3">
+ <xsd:complexType>
+ <xsd:sequence minOccurs='0' maxOccurs='3'>
+ <xsd:element name='f'/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:element name="o-3">
+ <xsd:complexType>
+ <xsd:sequence minOccurs='1' maxOccurs='3'>
+ <xsd:element name='g'/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+</xsd:schema>
diff --git a/libxml2/test/schemas/src-attribute1_0.xml b/libxml2/test/schemas/src-attribute1_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute1_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-attribute1_0.xsd b/libxml2/test/schemas/src-attribute1_0.xsd
new file mode 100644
index 0000000..dba8b48
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute1_0.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 1
+ default and fixed must not both be present
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo">
+ <complexType>
+ <attribute name="bar" type="string" default="moo" fixed="true"/>
+ </complexType>
+ </element>
+
+</schema>
diff --git a/libxml2/test/schemas/src-attribute2_0.xml b/libxml2/test/schemas/src-attribute2_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute2_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-attribute2_0.xsd b/libxml2/test/schemas/src-attribute2_0.xsd
new file mode 100644
index 0000000..d10cc81
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute2_0.xsd
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 2
+ If default and use are both present, use must have the ·actual value· optional
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo">
+ <complexType>
+ <attribute name="bar" type="string" use="required" default="moo" />
+ </complexType>
+ </element>
+
+</schema>
diff --git a/libxml2/test/schemas/src-attribute3-1_0.xml b/libxml2/test/schemas/src-attribute3-1_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-1_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-attribute3-1_0.xsd b/libxml2/test/schemas/src-attribute3-1_0.xsd
new file mode 100644
index 0000000..28e003c
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-1_0.xsd
@@ -0,0 +1,15 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 3.1
+ One of ref or name must be present, but not both
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo">
+ <complexType>
+ <attribute name="bar" ref="foo:bar" />
+ </complexType>
+ </element>
+
+ <attribute name="bar" type="string" />
+
+</schema>
diff --git a/libxml2/test/schemas/src-attribute3-2-form_0.xml b/libxml2/test/schemas/src-attribute3-2-form_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-2-form_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-attribute3-2-form_0.xsd b/libxml2/test/schemas/src-attribute3-2-form_0.xsd
new file mode 100644
index 0000000..0c7cc23
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-2-form_0.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 3.2
+ If ref is present, then all of <simpleType>, form and type must be absent
+ This one tests "form"
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo">
+ <complexType>
+ <attribute ref="foo:bar" form="qualified"/>
+ </complexType>
+ </element>
+
+ <attribute name="bar" type="string"/>
+
+</schema>
diff --git a/libxml2/test/schemas/src-attribute3-2-st_0.xml b/libxml2/test/schemas/src-attribute3-2-st_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-2-st_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-attribute3-2-st_0.xsd b/libxml2/test/schemas/src-attribute3-2-st_0.xsd
new file mode 100644
index 0000000..f256381
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-2-st_0.xsd
@@ -0,0 +1,22 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 3.2
+ If ref is present, then all of <simpleType>, form and type must be absent
+ This one tests <simpleType>
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo">
+ <complexType>
+ <attribute ref="foo:bar">
+ <simpleType>
+ <restriction base="string">
+ <maxLength value="20"/>
+ </restriction>
+ </simpleType>
+ </attribute>
+ </complexType>
+ </element>
+
+ <attribute name="bar" type="string" />
+
+</schema>
diff --git a/libxml2/test/schemas/src-attribute3-2-type_0.xml b/libxml2/test/schemas/src-attribute3-2-type_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-2-type_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-attribute3-2-type_0.xsd b/libxml2/test/schemas/src-attribute3-2-type_0.xsd
new file mode 100644
index 0000000..54f1973
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute3-2-type_0.xsd
@@ -0,0 +1,16 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 3.2
+ If ref is present, then all of <simpleType>, form and type must be absent
+ This one tests "type"
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo">
+ <complexType>
+ <attribute ref="foo:bar" type="string"/>
+ </complexType>
+ </element>
+
+ <attribute name="bar" type="string"/>
+
+</schema>
diff --git a/libxml2/test/schemas/src-attribute4_0.xml b/libxml2/test/schemas/src-attribute4_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute4_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-attribute4_0.xsd b/libxml2/test/schemas/src-attribute4_0.xsd
new file mode 100644
index 0000000..cc9d8ac
--- /dev/null
+++ b/libxml2/test/schemas/src-attribute4_0.xsd
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 3.2
+ type and <simpleType> must not both be present
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <attribute name="bar" type="string">
+ <simpleType>
+ <restriction base="string">
+ <maxLength value="20"/>
+ </restriction>
+ </simpleType>
+ </attribute>
+
+ <element name="foo"/>
+
+</schema>
diff --git a/libxml2/test/schemas/src-element1_0.xml b/libxml2/test/schemas/src-element1_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-element1_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-element1_0.xsd b/libxml2/test/schemas/src-element1_0.xsd
new file mode 100644
index 0000000..ffd8d57
--- /dev/null
+++ b/libxml2/test/schemas/src-element1_0.xsd
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 1
+ default and fixed must not both be present
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo" type="string" default="Joni" fixed="Mitchel"/>
+
+</schema>
diff --git a/libxml2/test/schemas/src-element2-1_0.xml b/libxml2/test/schemas/src-element2-1_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-element2-1_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-element2-1_0.xsd b/libxml2/test/schemas/src-element2-1_0.xsd
new file mode 100644
index 0000000..61c2edf
--- /dev/null
+++ b/libxml2/test/schemas/src-element2-1_0.xsd
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 2.1
+ One of ref or name must be present, but not both.
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="bar" type="string"/>
+
+ <element name="foo">
+ <complexType>
+ <sequence>
+ <element name="bar" ref="foo:bar"/>
+ </sequence>
+ </complexType>
+ </element>
+
+</schema>
diff --git a/libxml2/test/schemas/src-element2-2_0.xml b/libxml2/test/schemas/src-element2-2_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-element2-2_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-element2-2_0.xsd b/libxml2/test/schemas/src-element2-2_0.xsd
new file mode 100644
index 0000000..a70740a
--- /dev/null
+++ b/libxml2/test/schemas/src-element2-2_0.xsd
@@ -0,0 +1,48 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 2.2
+ If ref is present, then all of <complexType>, <simpleType>, <key>, <keyref>, <unique>,
+ nillable, default, fixed, form, block and type must be absent, i.e. only minOccurs, maxOccurs,
+ id are allowed in addition to ref, along with <annotation>.
+
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="bar" type="string"/>
+
+ <element name="foo">
+ <complexType>
+ <choice>
+
+ <!-- The good ones. -->
+ <element ref="foo:bar" minOccurs="0"/>
+ <element ref="foo:bar" maxOccurs="0"/>
+ <element ref="foo:bar" id="myomy"/>
+
+ <!-- The bad ones. -->
+ <element ref="foo:bar">
+ <complexType>
+ <attribute name="bar" type="string"/>
+ </complexType>
+ </element>
+
+ <element ref="foo:bar">
+ <simpleType>
+ <restriction base="string">
+ <maxLength value="20"/>
+ </restriction>
+ </simpleType>
+ </element>
+
+ <element ref="foo:bar" type="string"/>
+ <element ref="foo:bar" nillable="true"/>
+ <element ref="foo:bar" default="Joni"/>
+ <element ref="foo:bar" fixed="Mitchel"/>
+ <element ref="foo:bar" form="unqualified"/>
+ <element ref="foo:bar" block="restriction"/>
+
+ </choice>
+ </complexType>
+ </element>
+
+
+</schema>
diff --git a/libxml2/test/schemas/src-element3_0.xml b/libxml2/test/schemas/src-element3_0.xml
new file mode 100644
index 0000000..760efd9
--- /dev/null
+++ b/libxml2/test/schemas/src-element3_0.xml
@@ -0,0 +1,2 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<foo xmlns="http://FOO"/>
diff --git a/libxml2/test/schemas/src-element3_0.xsd b/libxml2/test/schemas/src-element3_0.xsd
new file mode 100644
index 0000000..28b69d8
--- /dev/null
+++ b/libxml2/test/schemas/src-element3_0.xsd
@@ -0,0 +1,29 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- 3.2.3 : 3
+ type and either <simpleType> or <complexType> are mutually exclusive
+-->
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://foo" xmlns:foo="http://foo">
+
+ <element name="foo" type="foo:someType">
+ <complexType>
+ <sequence>
+ <element name="bar" type="string"/>
+ </sequence>
+ </complexType>
+ </element>
+
+ <element name="bar" type="foo:someType">
+ <simpleType>
+ <restriction base="string">
+ <maxLength value="20"/>
+ </restriction>
+ </simpleType>
+ </element>
+
+ <complexType name="someType">
+ <sequence>
+ <element name="bar" type="string"/>
+ </sequence>
+ </complexType>
+
+</schema>
diff --git a/libxml2/test/schemas/subst-group-1_0.xsd b/libxml2/test/schemas/subst-group-1_0.xsd
new file mode 100644
index 0000000..af21eeb
--- /dev/null
+++ b/libxml2/test/schemas/subst-group-1_0.xsd
@@ -0,0 +1,45 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- Test for bug #341150 -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" >
+
+ <!-- This is the head of our substitution group for events that have only
+ simple content. -->
+ <xs:element name="SimpleEvent" type="SimpleEventType"/>
+
+ <!-- All SimpleEvent elements have the required set of attributes -->
+ <xs:complexType name="SimpleEventType">
+ <xs:simpleContent>
+ <xs:extension base="xs:anySimpleType">
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+
+ <!-- Common members of the SimpleEvent substitution group -->
+ <xs:element name="TestEvent" substitutionGroup="SimpleEvent">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:restriction base="SimpleEventType">
+ <xs:simpleType>
+ <xs:restriction base="xs:string"/>
+ </xs:simpleType>
+ </xs:restriction>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+
+ <!-- Root element -->
+ <xs:element name="TestRoot" type="TestRootType"/>
+
+ <!-- Core data type of an audit trail -->
+ <xs:complexType name="TestRootType">
+ <xs:sequence>
+ <xs:element name="Events">
+ <xs:complexType>
+ <xs:choice minOccurs="0" maxOccurs="unbounded">
+ <xs:element ref="SimpleEvent"/>
+ </xs:choice>
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+</xs:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/subst-group-1_1.xml b/libxml2/test/schemas/subst-group-1_1.xml
new file mode 100644
index 0000000..087fe02
--- /dev/null
+++ b/libxml2/test/schemas/subst-group-1_1.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- Test for bug #341150 -->
+<TestRoot xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:noNamespaceSchemaLocation="subst-group-1.xsd">
+ <Events>
+ <TestEvent>Test 1.</TestEvent>
+ <!-- Uncomment the following element to cause libxml's xmllint to
+ fail to validate. -->
+ <TestEvent>Test 2.</TestEvent>
+ </Events>
+</TestRoot>
+
diff --git a/libxml2/test/schemas/union2_1.xml b/libxml2/test/schemas/union2_1.xml
new file mode 100644
index 0000000..e148080
--- /dev/null
+++ b/libxml2/test/schemas/union2_1.xml
@@ -0,0 +1,6 @@
+<?xml version="1.0"?>
+<ELEMENTS xmlns="urn:test:foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="urn:test:foo union_1.xsd">
+ 5
+</ELEMENTS> \ No newline at end of file
diff --git a/libxml2/test/schemas/union2_1.xsd b/libxml2/test/schemas/union2_1.xsd
new file mode 100644
index 0000000..6d83726
--- /dev/null
+++ b/libxml2/test/schemas/union2_1.xsd
@@ -0,0 +1,21 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema" targetNamespace="urn:test:foo">
+ <xsd:element name="ELEMENTS">
+ <xsd:simpleType>
+ <xsd:union>
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:int">
+ <xsd:minInclusive value="10"/>
+ <xsd:maxInclusive value="20"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:int">
+ <xsd:minInclusive value="30"/>
+ <xsd:maxInclusive value="40"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:union>
+ </xsd:simpleType>
+ </xsd:element>
+</xsd:schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/union_0_0.xml b/libxml2/test/schemas/union_0_0.xml
new file mode 100644
index 0000000..1a47763
--- /dev/null
+++ b/libxml2/test/schemas/union_0_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<foo xmlns="http://foo"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://foo union_0_0.xsd">
+ <em>EMP0090</em>
+ <em>EMP0099</em>
+</foo>
+
diff --git a/libxml2/test/schemas/union_0_0.xsd b/libxml2/test/schemas/union_0_0.xsd
new file mode 100644
index 0000000..23e93d1
--- /dev/null
+++ b/libxml2/test/schemas/union_0_0.xsd
@@ -0,0 +1,53 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://foo"
+ xmlns="http://foo"
+ xmlns:a="http://foo">
+
+ <xsd:element name="foo">
+ <xsd:complexType>
+ <xsd:sequence>
+ <xsd:element name="em"
+ type="emType"
+ maxOccurs="unbounded"
+ form="qualified"/>
+ </xsd:sequence>
+ </xsd:complexType>
+ </xsd:element>
+
+ <xsd:simpleType name="emp0001_3Type">
+ <xsd:restriction base="xsd:ID">
+ <xsd:enumeration value="EMP0040"/>
+ <xsd:enumeration value="EMP0003"/>
+ <xsd:enumeration value="EMP0004"/>
+ <xsd:enumeration value="EMP0005"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:simpleType name="emp0004_5Type">
+ <xsd:restriction base="xsd:ID">
+ <xsd:enumeration value="EMP0002"/>
+ <xsd:enumeration value="EMP0090"/>
+ <xsd:enumeration value="EMP0007"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+ <xsd:simpleType name="unboundedEmType">
+ <xsd:union memberTypes="a:emp0001_3Type emp0004_5Type">
+ <xsd:simpleType>
+ <xsd:restriction base="xsd:ID">
+ <xsd:enumeration value="EMP0099"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+ </xsd:union>
+ </xsd:simpleType>
+
+ <xsd:simpleType name="emType">
+ <xsd:restriction base="unboundedEmType">
+ <xsd:pattern value="EMP[0-9]*"/>
+ </xsd:restriction>
+ </xsd:simpleType>
+
+
+
+</xsd:schema>
diff --git a/libxml2/test/schemas/vdv-complexTypes.xsd b/libxml2/test/schemas/vdv-complexTypes.xsd
new file mode 100644
index 0000000..cd40fb8
--- /dev/null
+++ b/libxml2/test/schemas/vdv-complexTypes.xsd
@@ -0,0 +1,37 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/complexTypes.xsd,v 1.1 2001/11/26 13:27:07 vdv Exp $ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+
+ <xs:complexType name="elementWithID">
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+ <xs:complexType name="bookTmp">
+ <xs:complexContent>
+ <xs:extension base="elementWithID">
+ <xs:sequence>
+ <xs:element ref="isbn"/>
+ <xs:element ref="title"/>
+ <xs:element ref="author" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="character" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute ref="available"/>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+
+ <xs:complexType name="personType">
+ <xs:complexContent>
+ <xs:extension base="elementWithID">
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="dead" minOccurs="0"/>
+ <xs:element ref="qualification" minOccurs="0"/>
+ </xs:sequence>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+
+
+</xs:schema>
diff --git a/libxml2/test/schemas/vdv-first0_0.xml b/libxml2/test/schemas/vdv-first0_0.xml
new file mode 100644
index 0000000..a12bcad
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first0_0.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first.xml,v 1.2 2001/11/01 22:03:06 vdv Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>1966-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>1951-05-30</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first0_0.xsd b/libxml2/test/schemas/vdv-first0_0.xsd
new file mode 100644
index 0000000..e58bed2
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first0_0.xsd
@@ -0,0 +1,67 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:element name="name" type="xs:string"/>
+ <xs:element name="qualification" type="xs:string"/>
+ <xs:element name="born" type="xs:date"/>
+ <xs:element name="dead" type="xs:date"/>
+ <xs:element name="isbn" type="xs:integer"/>
+
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="available" type="xs:boolean"/>
+ <xs:attribute name="lang" type="xs:language"/>
+
+ <xs:element name="title">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="xs:string">
+ <xs:attribute ref="lang"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="library">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="book" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="author">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="dead" minOccurs="0"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="book">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="isbn"/>
+ <xs:element ref="title"/>
+ <xs:element ref="author" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="character" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ <xs:attribute ref="available"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="character">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="qualification"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/vdv-first1_0.xml b/libxml2/test/schemas/vdv-first1_0.xml
new file mode 100644
index 0000000..a12bcad
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first1_0.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first.xml,v 1.2 2001/11/01 22:03:06 vdv Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>1966-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>1951-05-30</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first1_0.xsd b/libxml2/test/schemas/vdv-first1_0.xsd
new file mode 100644
index 0000000..c0d6f27
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first1_0.xsd
@@ -0,0 +1,47 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+ <xs:element name="library">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="book" maxOccurs="unbounded">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="isbn" type="xs:integer"/>
+ <xs:element name="title">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="xs:string">
+ <xs:attribute name="lang" type="xs:language"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="author" minOccurs="0" maxOccurs="unbounded">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="name" type="xs:string"/>
+ <xs:element name="born" type="xs:date"/>
+ <xs:element name="dead" type="xs:date"/>
+ </xs:sequence>
+ <xs:attribute name="id" type="xs:ID"/>
+ </xs:complexType>
+ </xs:element>
+ <xs:element name="character" minOccurs="0" maxOccurs="unbounded">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element name="name" type="xs:string"/>
+ <xs:element name="born" type="xs:date"/>
+ <xs:element name="qualification" type="xs:string"/>
+ </xs:sequence>
+ <xs:attribute name="id" type="xs:ID"/>
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="available" type="xs:boolean"/>
+ </xs:complexType>
+ </xs:element>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+</xs:schema>
diff --git a/libxml2/test/schemas/vdv-first2_0.xml b/libxml2/test/schemas/vdv-first2_0.xml
new file mode 100644
index 0000000..a12bcad
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first2_0.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first.xml,v 1.2 2001/11/01 22:03:06 vdv Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>1966-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>1951-05-30</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first2_0.xsd b/libxml2/test/schemas/vdv-first2_0.xsd
new file mode 100644
index 0000000..c768e97
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first2_0.xsd
@@ -0,0 +1,89 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first-user-dt.xsd,v 1.1 2001/11/01 12:27:47 vdv Exp $ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:simpleType name="string255">
+ <xs:restriction base="xs:token">
+ <xs:maxLength value="255"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="string32">
+ <xs:restriction base="xs:token">
+ <xs:maxLength value="32"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="isbn">
+ <xs:restriction base="xs:unsignedLong">
+ <xs:totalDigits value="10"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="supportedLanguages">
+ <xs:restriction base="xs:language">
+ <xs:enumeration value="en"/>
+ <xs:enumeration value="es"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:element name="name" type="string32"/>
+ <xs:element name="qualification" type="string255"/>
+ <xs:element name="born" type="xs:date"/>
+ <xs:element name="dead" type="xs:date"/>
+ <xs:element name="isbn" type="isbn"/>
+
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="available" type="xs:boolean"/>
+ <xs:attribute name="lang" type="supportedLanguages"/>
+
+ <xs:element name="title">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="string255">
+ <xs:attribute ref="lang"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="library">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="book" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="author">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="dead" minOccurs="0"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="book">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="isbn"/>
+ <xs:element ref="title"/>
+ <xs:element ref="author" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="character" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ <xs:attribute ref="available"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="character">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="qualification"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/vdv-first3_0.xml b/libxml2/test/schemas/vdv-first3_0.xml
new file mode 100644
index 0000000..a12bcad
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first3_0.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first.xml,v 1.2 2001/11/01 22:03:06 vdv Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>1966-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>1951-05-30</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first3_0.xsd b/libxml2/test/schemas/vdv-first3_0.xsd
new file mode 100644
index 0000000..18b1459
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first3_0.xsd
@@ -0,0 +1,68 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first-token.xsd,v 1.2 2001/11/01 12:27:47 vdv Exp $ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:element name="name" type="xs:token"/>
+ <xs:element name="qualification" type="xs:token"/>
+ <xs:element name="born" type="xs:date"/>
+ <xs:element name="dead" type="xs:date"/>
+ <xs:element name="isbn" type="xs:unsignedLong"/>
+
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="available" type="xs:boolean"/>
+ <xs:attribute name="lang" type="xs:language"/>
+
+ <xs:element name="title">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="xs:token">
+ <xs:attribute ref="lang"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="library">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="book" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="author">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="dead" minOccurs="0"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="book">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="isbn"/>
+ <xs:element ref="title"/>
+ <xs:element ref="author" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="character" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ <xs:attribute ref="available"/>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="character">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="qualification"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/vdv-first4_0.xml b/libxml2/test/schemas/vdv-first4_0.xml
new file mode 100644
index 0000000..0b2d7e2
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first4_0.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /cvs/gnome/gnome-xml/test/schemas/vdv-first3_0.xml,v 1.1 2003/11/22 20:37:51 veillard Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>1966-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>1951-05-30</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first4_0.xsd b/libxml2/test/schemas/vdv-first4_0.xsd
new file mode 100755
index 0000000..9e8e236
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first4_0.xsd
@@ -0,0 +1,150 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first-complex-types.xsd,v 1.1 2001/11/12 20:54:00 vdv Exp $ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:simpleType name="string255">
+ <xs:restriction base="xs:token">
+ <xs:maxLength value="255"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="string32">
+ <xs:restriction base="xs:token">
+ <xs:maxLength value="32"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="isbn">
+ <xs:restriction base="xs:unsignedLong">
+ <xs:totalDigits value="10"/>
+ <xs:pattern value="\d{10}"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="bookID">
+ <xs:restriction base="xs:ID">
+ <xs:pattern value="b\d{10}"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="supportedLanguages">
+ <xs:restriction base="xs:language">
+ <xs:enumeration value="en"/>
+ <xs:enumeration value="es"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:simpleType name="date">
+ <xs:restriction base="xs:date">
+ <xs:pattern value="[^:Z]*"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+ <xs:element name="name" type="string32"/>
+ <xs:element name="qualification" type="string255"/>
+ <xs:element name="born" type="date"/>
+ <xs:element name="dead" type="date"/>
+ <xs:element name="isbn" type="isbn"/>
+
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="available" type="xs:boolean"/>
+ <xs:attribute name="lang" type="supportedLanguages"/>
+
+ <xs:complexType name="elementWithID">
+ <xs:attribute ref="id"/>
+ </xs:complexType>
+
+ <xs:complexType name="bookTmp">
+ <xs:complexContent>
+ <xs:extension base="elementWithID">
+ <xs:sequence>
+ <xs:element ref="isbn"/>
+ <xs:element ref="title"/>
+ <xs:element ref="author" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="character" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute ref="available"/>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+
+ <xs:complexType name="personType">
+ <xs:complexContent>
+ <xs:extension base="elementWithID">
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="dead" minOccurs="0"/>
+ <xs:element ref="qualification" minOccurs="0"/>
+ </xs:sequence>
+ </xs:extension>
+ </xs:complexContent>
+ </xs:complexType>
+
+ <xs:element name="title">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="string255">
+ <xs:attribute ref="lang"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="library">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="book" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="book">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="bookTmp">
+ <xs:sequence>
+ <xs:element ref="isbn"/>
+ <xs:element ref="title"/>
+ <xs:element ref="author" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="character" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute name="id" type="bookID"/>
+ <xs:attribute ref="available"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="author">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="personType">
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="dead" minOccurs="0"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+
+ <xs:element name="character">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="personType">
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="qualification"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/vdv-first4_1.xml b/libxml2/test/schemas/vdv-first4_1.xml
new file mode 100644
index 0000000..1259ef2
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first4_1.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /cvs/gnome/gnome-xml/test/schemas/vdv-first3_0.xml,v 1.1 2003/11/22 20:37:51 veillard Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>196T6-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>1951-05-30</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first4_2.xml b/libxml2/test/schemas/vdv-first4_2.xml
new file mode 100644
index 0000000..c4acce6
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first4_2.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /cvs/gnome/gnome-xml/test/schemas/vdv-first3_0.xml,v 1.1 2003/11/22 20:37:51 veillard Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>1966-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>2000-01-20Z</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first5_0.xml b/libxml2/test/schemas/vdv-first5_0.xml
new file mode 100644
index 0000000..7d4e662
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first5_0.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /cvs/gnome/gnome-xml/test/schemas/vdv-first0_0.xml,v 1.1 2003/11/22 20:37:51 veillard Exp $ -->
+<library>
+ <book id="b0836217462" available="true">
+ <isbn>0836217462</isbn>
+ <title lang="en">Being a Dog Is a Full-Time Job</title>
+ <author id="CMS">
+ <name>Charles M Schulz</name>
+ <born>1922-11-26</born>
+ <dead>2000-02-12</dead>
+ </author>
+ <character id="PP">
+ <name>Peppermint Patty</name>
+ <born>1966-08-22</born>
+ <qualification>bold, brash and tomboyish</qualification>
+ </character>
+ <character id="Snoopy">
+ <name>Snoopy</name>
+ <born>1950-10-04</born>
+ <qualification>extroverted beagle</qualification>
+ </character>
+ <character id="Schroeder">
+ <name>Schroeder</name>
+ <born>1951-05-30</born>
+ <qualification>brought classical music to the Peanuts strip</qualification>
+ </character>
+ <character id="Lucy">
+ <name>Lucy</name>
+ <born>1952-03-03</born>
+ <qualification>bossy, crabby and selfish</qualification>
+ </character>
+ </book>
+</library>
diff --git a/libxml2/test/schemas/vdv-first5_0.xsd b/libxml2/test/schemas/vdv-first5_0.xsd
new file mode 100644
index 0000000..6d5ffaa
--- /dev/null
+++ b/libxml2/test/schemas/vdv-first5_0.xsd
@@ -0,0 +1,85 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/first-building-blocks.xsd,v 1.1 2001/11/26 13:27:07 vdv Exp $ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+<xs:include schemaLocation="vdv-simpleTypes.xsd"/>
+<xs:include schemaLocation="vdv-complexTypes.xsd"/>
+
+ <xs:element name="name" type="string32"/>
+ <xs:element name="qualification" type="string255"/>
+ <xs:element name="born" type="date"/>
+ <xs:element name="dead" type="date"/>
+ <xs:element name="isbn" type="isbn"/>
+
+ <xs:attribute name="id" type="xs:ID"/>
+ <xs:attribute name="available" type="xs:boolean"/>
+ <xs:attribute name="lang" type="supportedLanguages"/>
+
+
+ <xs:element name="title">
+ <xs:complexType>
+ <xs:simpleContent>
+ <xs:extension base="string255">
+ <xs:attribute ref="lang"/>
+ </xs:extension>
+ </xs:simpleContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="library">
+ <xs:complexType>
+ <xs:sequence>
+ <xs:element ref="book" maxOccurs="unbounded"/>
+ </xs:sequence>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="book">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="bookTmp">
+ <xs:sequence>
+ <xs:element ref="isbn"/>
+ <xs:element ref="title"/>
+ <xs:element ref="author" minOccurs="0" maxOccurs="unbounded"/>
+ <xs:element ref="character" minOccurs="0" maxOccurs="unbounded"/>
+ </xs:sequence>
+ <xs:attribute name="id" type="bookID"/>
+ <xs:attribute ref="available"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+ <xs:element name="author">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="personType">
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="dead" minOccurs="0"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+
+ <xs:element name="character">
+ <xs:complexType>
+ <xs:complexContent>
+ <xs:restriction base="personType">
+ <xs:sequence>
+ <xs:element ref="name"/>
+ <xs:element ref="born"/>
+ <xs:element ref="qualification"/>
+ </xs:sequence>
+ <xs:attribute ref="id"/>
+ </xs:restriction>
+ </xs:complexContent>
+ </xs:complexType>
+ </xs:element>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/vdv-simpleTypes.xsd b/libxml2/test/schemas/vdv-simpleTypes.xsd
new file mode 100644
index 0000000..79f95fd
--- /dev/null
+++ b/libxml2/test/schemas/vdv-simpleTypes.xsd
@@ -0,0 +1,38 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!-- $Header: /home/cvsroot/w3c-xml-schema/user/examples/simpleTypes.xsd,v 1.1 2001/11/26 13:27:08 vdv Exp $ -->
+<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
+
+ <xs:simpleType name="string255">
+ <xs:restriction base="xs:token">
+ <xs:maxLength value="255"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="string32">
+ <xs:restriction base="xs:token">
+ <xs:maxLength value="32"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="isbn">
+ <xs:restriction base="xs:unsignedLong">
+ <xs:totalDigits value="10"/>
+ <xs:pattern value="\d{10}"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="bookID">
+ <xs:restriction base="xs:ID">
+ <xs:pattern value="b\d{10}"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="supportedLanguages">
+ <xs:restriction base="xs:language">
+ <xs:enumeration value="en"/>
+ <xs:enumeration value="es"/>
+ </xs:restriction>
+ </xs:simpleType>
+ <xs:simpleType name="date">
+ <xs:restriction base="xs:date">
+ <xs:pattern value="[^:Z]*"/>
+ </xs:restriction>
+ </xs:simpleType>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/xml.xsd b/libxml2/test/schemas/xml.xsd
new file mode 100644
index 0000000..e49fff8
--- /dev/null
+++ b/libxml2/test/schemas/xml.xsd
@@ -0,0 +1,117 @@
+<?xml version='1.0' encoding="ISO-8859-1"?>
+<!--!DOCTYPE xs:schema PUBLIC "-//W3C//DTD XMLSCHEMA 200102//EN" "XMLSchema.dtd" -->
+<xs:schema targetNamespace="http://www.w3.org/XML/1998/namespace" xmlns:xs="http://www.w3.org/2001/XMLSchema" xml:lang="en">
+
+ <xs:annotation>
+ <xs:documentation>
+ See http://www.w3.org/XML/1998/namespace.html and
+ http://www.w3.org/TR/REC-xml for information about this namespace.
+
+ This schema document describes the XML namespace, in a form
+ suitable for import by other schema documents.
+
+ Note that local names in this namespace are intended to be defined
+ only by the World Wide Web Consortium or its subgroups. The
+ following names are currently defined in this namespace and should
+ not be used with conflicting semantics by any Working Group,
+ specification, or document instance:
+
+ base (as an attribute name): denotes an attribute whose value
+ provides a URI to be used as the base for interpreting any
+ relative URIs in the scope of the element on which it
+ appears; its value is inherited. This name is reserved
+ by virtue of its definition in the XML Base specification.
+
+ lang (as an attribute name): denotes an attribute whose value
+ is a language code for the natural language of the content of
+ any element; its value is inherited. This name is reserved
+ by virtue of its definition in the XML specification.
+
+ space (as an attribute name): denotes an attribute whose
+ value is a keyword indicating what whitespace processing
+ discipline is intended for the content of the element; its
+ value is inherited. This name is reserved by virtue of its
+ definition in the XML specification.
+
+ Father (in any context at all): denotes Jon Bosak, the chair of
+ the original XML Working Group. This name is reserved by
+ the following decision of the W3C XML Plenary and
+ XML Coordination groups:
+
+ In appreciation for his vision, leadership and dedication
+ the W3C XML Plenary on this 10th day of February, 2000
+ reserves for Jon Bosak in perpetuity the XML name
+ xml:Father
+ </xs:documentation>
+ </xs:annotation>
+
+ <xs:annotation>
+ <xs:documentation>This schema defines attributes and an attribute group
+ suitable for use by
+ schemas wishing to allow xml:base, xml:lang or xml:space attributes
+ on elements they define.
+
+ To enable this, such a schema must import this schema
+ for the XML namespace, e.g. as follows:
+ &lt;schema . . .>
+ . . .
+ &lt;import namespace="http://www.w3.org/XML/1998/namespace"
+ schemaLocation="http://www.w3.org/2001/03/xml.xsd"/>
+
+ Subsequently, qualified reference to any of the attributes
+ or the group defined below will have the desired effect, e.g.
+
+ &lt;type . . .>
+ . . .
+ &lt;attributeGroup ref="xml:specialAttrs"/>
+
+ will define a type which will schema-validate an instance
+ element with any of those attributes</xs:documentation>
+ </xs:annotation>
+
+ <xs:annotation>
+ <xs:documentation>In keeping with the XML Schema WG's standard versioning
+ policy, this schema document will persist at
+ http://www.w3.org/2001/03/xml.xsd.
+ At the date of issue it can also be found at
+ http://www.w3.org/2001/xml.xsd.
+ The schema document at that URI may however change in the future,
+ in order to remain compatible with the latest version of XML Schema
+ itself. In other words, if the XML Schema namespace changes, the version
+ of this document at
+ http://www.w3.org/2001/xml.xsd will change
+ accordingly; the version at
+ http://www.w3.org/2001/03/xml.xsd will not change.
+ </xs:documentation>
+ </xs:annotation>
+
+ <xs:attribute name="lang" type="xs:language">
+ <xs:annotation>
+ <xs:documentation>In due course, we should install the relevant ISO 2- and 3-letter
+ codes as the enumerated possible values . . .</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+
+ <xs:attribute name="space" default="preserve">
+ <xs:simpleType>
+ <xs:restriction base="xs:NCName">
+ <xs:enumeration value="default"/>
+ <xs:enumeration value="preserve"/>
+ </xs:restriction>
+ </xs:simpleType>
+ </xs:attribute>
+
+ <xs:attribute name="base" type="xs:anyURI">
+ <xs:annotation>
+ <xs:documentation>See http://www.w3.org/TR/xmlbase/ for
+ information about this attribute.</xs:documentation>
+ </xs:annotation>
+ </xs:attribute>
+
+ <xs:attributeGroup name="specialAttrs">
+ <xs:attribute ref="xml:base"/>
+ <xs:attribute ref="xml:lang"/>
+ <xs:attribute ref="xml:space"/>
+ </xs:attributeGroup>
+
+</xs:schema>
diff --git a/libxml2/test/schemas/xsd-list-itemType_0.xml b/libxml2/test/schemas/xsd-list-itemType_0.xml
new file mode 100644
index 0000000..a20e408
--- /dev/null
+++ b/libxml2/test/schemas/xsd-list-itemType_0.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- This is the test data for the check of the implementation of the "itemType" attribute of the xsd:list element. -->
+<foo xmlns="http://FOO">tea for two and two for tea</foo>
diff --git a/libxml2/test/schemas/xsd-list-itemType_0.xsd b/libxml2/test/schemas/xsd-list-itemType_0.xsd
new file mode 100644
index 0000000..b96dbb4
--- /dev/null
+++ b/libxml2/test/schemas/xsd-list-itemType_0.xsd
@@ -0,0 +1,14 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+
+<!-- This test checks the implementation of the "itemType" attribute of the xsd:list element. -->
+
+<schema xmlns="http://www.w3.org/2001/XMLSchema" targetNamespace="http://FOO" xmlns:foo="http://FOO">
+
+ <element name="foo">
+ <simpleType>
+ <list itemType="string"/>
+ </simpleType>
+ </element>
+
+
+</schema> \ No newline at end of file
diff --git a/libxml2/test/schemas/xsd-simpleType-varieties_0.xml b/libxml2/test/schemas/xsd-simpleType-varieties_0.xml
new file mode 100644
index 0000000..83a0b2a
--- /dev/null
+++ b/libxml2/test/schemas/xsd-simpleType-varieties_0.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<!-- This is the test data for the check of the implementation of varieties of xsd:simpleType element. -->
+<foo xmlns="http://FOO">
+ <barA>fajita</barA>
+ <barB>pub pub</barB>
+ <barC><![CDATA[tequilla]]></barC>
+</foo>
+
diff --git a/libxml2/test/schemas/xsd-simpleType-varieties_0.xsd b/libxml2/test/schemas/xsd-simpleType-varieties_0.xsd
new file mode 100644
index 0000000..8a752e2
--- /dev/null
+++ b/libxml2/test/schemas/xsd-simpleType-varieties_0.xsd
@@ -0,0 +1,45 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+
+<!-- This test checks the implementation of the varieties of the xsd:simpleType element. -->
+
+<schema xmlns="http://www.w3.org/2001/XMLSchema"
+ targetNamespace="http://FOO" xmlns:foo="http://FOO"
+ elementFormDefault="qualified">
+
+ <element name="foo">
+ <complexType>
+ <sequence maxOccurs="unbounded">
+ <element name="barA">
+ <simpleType>
+ <union memberTypes="foo:typeA foo:typeB"/>
+ </simpleType>
+ </element>
+ <element name="barB">
+ <simpleType>
+ <list itemType="foo:typeA"/>
+ </simpleType>
+ </element>
+ <element name="barC">
+ <simpleType>
+ <restriction base="string">
+ <enumeration value="tequilla"/>
+ </restriction>
+ </simpleType>
+ </element>
+ </sequence>
+ </complexType>
+ </element>
+
+ <simpleType name="typeA">
+ <restriction base="string">
+ <enumeration value="pub"/>
+ </restriction>
+ </simpleType>
+
+ <simpleType name="typeB">
+ <restriction base="string">
+ <enumeration value="fajita"/>
+ </restriction>
+ </simpleType>
+
+</schema>