[Openvas-commits] r3235 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue May 5 12:14:33 CEST 2009


Author: chandra
Date: 2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)
New Revision: 3235

Added:
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00111.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00129.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00132.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00133.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00137.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00144.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00147.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00151.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00153.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00156.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00159.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00160.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00162.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00163.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00167.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00168.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00175.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00180.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00181.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00183.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00187.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00188.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00191.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00192.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00194.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00197.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00198.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00199.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00202.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00205.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00206.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00207.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00209.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00213.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00215.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00221.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00224.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00232.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00233.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00237.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00242.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00246.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00250.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00251.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00252.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00253.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00254.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00255.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00256.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00258.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00262.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00263.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00264.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00266.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00267.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00268.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00271.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00272.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00274.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00275.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00276.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00280.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00281.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00282.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00286.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00287.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00288.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00289.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00290.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00292.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00293.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00294.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00295.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00296.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00297.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00299.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00300.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00301.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00304.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00307.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00308.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00309.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00310.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00312.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01002.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01006.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01011.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01018.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01019.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01020.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01022.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01038.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01044.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01050.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01054.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01061.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01062.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01064.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01065.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01070.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01086.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01088.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01090.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01100.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01102.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01105.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01117.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01118.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01119.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01123.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01133.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01137.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01165.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01214.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01218.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01219.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01230.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01232.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02072.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02076.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02082.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02087.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02108.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02129.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02153.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02156.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02181.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02183.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02186.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02192.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02195.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02196.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02203.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02204.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02205.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02217.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02218.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02219.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02225.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02247.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02248.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02249.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02251.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02259.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02262.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02273.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02277.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02284.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02285.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02286.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02287.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02289.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02292.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02294.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02295.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02296.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02303.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02308.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02313.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02316.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02324.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02330.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02332.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02334.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02335.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02337.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02341.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02342.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02354.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02356.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02365.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02370.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02375.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02381.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02389.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02393.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02401.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02407.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02408.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02409.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02411.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02415.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02418.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added HP-UX Local Security Checks

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/ChangeLog	2009-05-05 10:14:23 UTC (rev 3235)
@@ -1,3 +1,202 @@
+2009-05-05 Chandrashekhar B <bchandra at secpod.com>
+	* scripts/gb_hp_ux_HPSBUX02365.nasl
+	scripts/gb_hp_ux_HPSBUX01137.nasl
+	scripts/gb_hp_ux_HPSBUX02082.nasl
+	scripts/gb_hp_ux_HPSBUX00250.nasl
+	scripts/gb_hp_ux_HPSBUX00233.nasl
+	scripts/gb_hp_ux_HPSBUX00194.nasl
+	scripts/gb_hp_ux_HPSBUX01070.nasl
+	scripts/gb_hp_ux_HPSBUX02156.nasl
+	scripts/gb_hp_ux_HPSBUX02303.nasl
+	scripts/gb_hp_ux_HPSBUX02411.nasl
+	scripts/gb_hp_ux_HPSBUX00307.nasl
+	scripts/gb_hp_ux_HPSBUX02247.nasl
+	scripts/gb_hp_ux_HPSBUX00268.nasl
+	scripts/gb_hp_ux_HPSBUX01019.nasl
+	scripts/gb_hp_ux_HPSBUX01088.nasl
+	scripts/gb_hp_ux_HPSBUX00132.nasl
+	scripts/gb_hp_ux_HPSBUX02072.nasl
+	scripts/gb_hp_ux_HPSBUX01218.nasl
+	scripts/gb_hp_ux_HPSBUX00206.nasl
+	scripts/gb_hp_ux_HPSBUX00292.nasl
+	scripts/gb_hp_ux_HPSBUX00167.nasl
+	scripts/gb_hp_ux_HPSBUX02129.nasl
+	scripts/gb_hp_ux_HPSBUX02401.nasl
+	scripts/gb_hp_ux_HPSBUX00275.nasl
+	scripts/gb_hp_ux_HPSBUX00258.nasl
+	scripts/gb_hp_ux_HPSBUX01117.nasl
+	scripts/gb_hp_ux_HPSBUX02289.nasl
+	scripts/gb_hp_ux_HPSBUX00191.nasl
+	scripts/gb_hp_ux_HPSBUX00213.nasl
+	scripts/gb_hp_ux_HPSBUX02153.nasl
+	scripts/gb_hp_ux_HPSBUX01050.nasl
+	scripts/gb_hp_ux_HPSBUX00282.nasl
+	scripts/gb_hp_ux_HPSBUX00304.nasl
+	scripts/gb_hp_ux_HPSBUX02335.nasl
+	scripts/gb_hp_ux_HPSBUX01232.nasl
+	scripts/gb_hp_ux_HPSBUX02296.nasl
+	scripts/gb_hp_ux_HPSBUX02409.nasl
+	scripts/gb_hp_ux_HPSBUX00181.nasl
+	scripts/gb_hp_ux_HPSBUX02251.nasl
+	scripts/gb_hp_ux_HPSBUX00272.nasl
+	scripts/gb_hp_ux_HPSBUX00147.nasl
+	scripts/gb_hp_ux_HPSBUX02087.nasl
+	scripts/gb_hp_ux_HPSBUX00255.nasl
+	scripts/gb_hp_ux_HPSBUX01006.nasl
+	scripts/gb_hp_ux_HPSBUX02195.nasl
+	scripts/gb_hp_ux_HPSBUX02342.nasl
+	scripts/gb_hp_ux_HPSBUX02217.nasl
+	scripts/gb_hp_ux_HPSBUX00199.nasl
+	scripts/gb_hp_ux_HPSBUX02286.nasl
+	scripts/gb_hp_ux_HPSBUX02308.nasl
+	scripts/gb_hp_ux_HPSBUX00301.nasl
+	scripts/gb_hp_ux_HPSBUX00262.nasl
+	scripts/gb_hp_ux_HPSBUX00137.nasl
+	scripts/gb_hp_ux_HPSBUX02332.nasl
+	scripts/gb_hp_ux_HPSBUX00228.nasl
+	scripts/gb_hp_ux_HPSBUX01104.nasl
+	scripts/gb_hp_ux_HPSBUX01065.nasl
+	scripts/gb_hp_ux_HPSBUX00297.nasl
+	scripts/gb_hp_ux_HPSBUX02259.nasl
+	scripts/gb_hp_ux_HPSBUX00144.nasl
+	scripts/gb_hp_ux_HPSBUX01020.nasl
+	scripts/gb_hp_ux_HPSBUX00252.nasl
+	scripts/gb_hp_ux_HPSBUX02192.nasl
+	scripts/gb_hp_ux_HPSBUX00179.nasl
+	scripts/gb_hp_ux_HPSBUX00287.nasl
+	scripts/gb_hp_ux_HPSBUX00309.nasl
+	scripts/gb_hp_ux_HPSBUX01038.nasl
+	scripts/gb_hp_ux_HPSBUX02249.nasl
+	scripts/gb_hp_ux_HPSBUX00151.nasl
+	scripts/gb_hp_ux_HPSBUX00242.nasl
+	scripts/gb_hp_ux_HPSBUX02204.nasl
+	scripts/gb_hp_ux_HPSBUX01062.nasl
+	scripts/gb_hp_ux_HPSBUX02273.nasl
+	scripts/gb_hp_ux_HPSBUX00294.nasl
+	scripts/gb_hp_ux_HPSBUX00169.nasl
+	scripts/gb_hp_ux_HPSBUX02381.nasl
+	scripts/gb_hp_ux_HPSBUX01119.nasl
+	scripts/gb_hp_ux_HPSBUX00141.nasl
+	scripts/gb_hp_ux_HPSBUX00232.nasl
+	scripts/gb_hp_ux_HPSBUX00215.nasl
+	scripts/gb_hp_ux_HPSBUX00159.nasl
+	scripts/gb_hp_ux_HPSBUX00267.nasl
+	scripts/gb_hp_ux_HPSBUX01018.nasl
+	scripts/gb_hp_ux_HPSBUX02354.nasl
+	scripts/gb_hp_ux_HPSBUX02337.nasl
+	scripts/gb_hp_ux_HPSBUX02389.nasl
+	scripts/gb_hp_ux_HPSBUX00183.nasl
+	scripts/gb_hp_ux_HPSBUX00205.nasl
+	scripts/gb_hp_ux_HPSBUX00274.nasl
+	scripts/gb_hp_ux_HPSBUX01133.nasl
+	scripts/gb_hp_ux_HPSBUX02219.nasl
+	scripts/gb_hp_ux_HPSBUX02418.nasl
+	scripts/gb_hp_ux_HPSBUX00281.nasl
+	scripts/gb_hp_ux_HPSBUX00156.nasl
+	scripts/gb_hp_ux_HPSBUX00303.nasl
+	scripts/gb_hp_ux_HPSBUX00264.nasl
+	scripts/gb_hp_ux_HPSBUX02351.nasl
+	scripts/gb_hp_ux_HPSBUX01123.nasl
+	scripts/gb_hp_ux_HPSBUX02334.nasl
+	scripts/gb_hp_ux_HPSBUX02295.nasl
+	scripts/gb_hp_ux_HPSBUX01214.nasl
+	scripts/gb_hp_ux_HPSBUX00299.nasl
+	scripts/gb_hp_ux_HPSBUX00111.nasl
+	scripts/gb_hp_ux_HPSBUX02408.nasl
+	scripts/gb_hp_ux_HPSBUX00180.nasl
+	scripts/gb_hp_ux_HPSBUX00202.nasl
+	scripts/gb_hp_ux_HPSBUX00163.nasl
+	scripts/gb_hp_ux_HPSBUX00310.nasl
+	scripts/gb_hp_ux_HPSBUX00271.nasl
+	scripts/gb_hp_ux_HPSBUX01022.nasl
+	scripts/gb_hp_ux_HPSBUX02108.nasl
+	scripts/gb_hp_ux_HPSBUX00254.nasl
+	scripts/gb_hp_ux_HPSBUX00129.nasl
+	scripts/gb_hp_ux_HPSBUX02341.nasl
+	scripts/gb_hp_ux_HPSBUX00237.nasl
+	scripts/gb_hp_ux_HPSBUX02324.nasl
+	scripts/gb_hp_ux_HPSBUX00198.nasl
+	scripts/gb_hp_ux_HPSBUX02285.nasl
+	scripts/gb_hp_ux_HPSBUX02393.nasl
+	scripts/gb_hp_ux_HPSBUX02415.nasl
+	scripts/gb_hp_ux_HPSBUX00289.nasl
+	scripts/gb_hp_ux_HPSBUX01165.nasl
+	scripts/gb_hp_ux_HPSBUX00153.nasl
+	scripts/gb_hp_ux_HPSBUX00300.nasl
+	scripts/gb_hp_ux_HPSBUX02076.nasl
+	scripts/gb_hp_ux_HPSBUX02292.nasl
+	scripts/gb_hp_ux_HPSBUX00188.nasl
+	scripts/gb_hp_ux_HPSBUX01064.nasl
+	scripts/gb_hp_ux_HPSBUX00296.nasl
+	scripts/gb_hp_ux_HPSBUX00160.nasl
+	scripts/gb_hp_ux_HPSBUX00251.nasl
+	scripts/gb_hp_ux_HPSBUX01002.nasl
+	scripts/gb_hp_ux_HPSBUX00178.nasl
+	scripts/gb_hp_ux_HPSBUX01054.nasl
+	scripts/gb_hp_ux_HPSBUX00286.nasl
+	scripts/gb_hp_ux_HPSBUX00308.nasl
+	scripts/gb_hp_ux_HPSBUX02248.nasl
+	scripts/gb_hp_ux_HPSBUX02356.nasl
+	scripts/gb_hp_ux_HPSBUX00133.nasl
+	scripts/gb_hp_ux_HPSBUX02073.nasl
+	scripts/gb_hp_ux_HPSBUX01219.nasl
+	scripts/gb_hp_ux_HPSBUX02181.nasl
+	scripts/gb_hp_ux_HPSBUX02203.nasl
+	scripts/gb_hp_ux_HPSBUX00224.nasl
+	scripts/gb_hp_ux_HPSBUX01100.nasl
+	scripts/gb_hp_ux_HPSBUX01061.nasl
+	scripts/gb_hp_ux_HPSBUX00207.nasl
+	scripts/gb_hp_ux_HPSBUX00293.nasl
+	scripts/gb_hp_ux_HPSBUX00168.nasl
+	scripts/gb_hp_ux_HPSBUX01044.nasl
+	scripts/gb_hp_ux_HPSBUX00276.nasl
+	scripts/gb_hp_ux_HPSBUX01118.nasl
+	scripts/gb_hp_ux_HPSBUX00192.nasl
+	scripts/gb_hp_ux_HPSBUX00175.nasl
+	scripts/gb_hp_ux_HPSBUX02262.nasl
+	scripts/gb_hp_ux_HPSBUX02370.nasl
+	scripts/gb_hp_ux_HPSBUX00266.nasl
+	scripts/gb_hp_ux_HPSBUX00249.nasl
+	scripts/gb_hp_ux_HPSBUX01086.nasl
+	scripts/gb_hp_ux_HPSBUX00221.nasl
+	scripts/gb_hp_ux_HPSBUX00290.nasl
+	scripts/gb_hp_ux_HPSBUX00165.nasl
+	scripts/gb_hp_ux_HPSBUX00312.nasl
+	scripts/gb_hp_ux_HPSBUX00148.nasl
+	scripts/gb_hp_ux_HPSBUX00256.nasl
+	scripts/gb_hp_ux_HPSBUX02196.nasl
+	scripts/gb_hp_ux_HPSBUX02218.nasl
+	scripts/gb_hp_ux_HPSBUX02287.nasl
+	scripts/gb_hp_ux_HPSBUX00280.nasl
+	scripts/gb_hp_ux_HPSBUX00263.nasl
+	scripts/gb_hp_ux_HPSBUX02225.nasl
+	scripts/gb_hp_ux_HPSBUX00246.nasl
+	scripts/gb_hp_ux_HPSBUX02186.nasl
+	scripts/gb_hp_ux_HPSBUX01230.nasl
+	scripts/gb_hp_ux_HPSBUX01105.nasl
+	scripts/gb_hp_ux_HPSBUX02294.nasl
+	scripts/gb_hp_ux_HPSBUX02316.nasl
+	scripts/gb_hp_ux_HPSBUX02277.nasl
+	scripts/gb_hp_ux_HPSBUX02407.nasl
+	scripts/gb_hp_ux_HPSBUX00162.nasl
+	scripts/gb_hp_ux_HPSBUX00253.nasl
+	scripts/gb_hp_ux_HPSBUX01090.nasl
+	scripts/gb_hp_ux_HPSBUX00197.nasl
+	scripts/gb_hp_ux_HPSBUX02284.nasl
+	scripts/gb_hp_ux_HPSBUX02306.nasl
+	scripts/gb_hp_ux_HPSBUX00288.nasl
+	scripts/gb_hp_ux_HPSBUX02375.nasl
+	scripts/gb_hp_ux_HPSBUX01011.nasl
+	scripts/gb_hp_ux_HPSBUX02183.nasl
+	scripts/gb_hp_ux_HPSBUX02330.nasl
+	scripts/gb_hp_ux_HPSBUX02205.nasl
+	scripts/gb_hp_ux_HPSBUX01102.nasl
+	scripts/gb_hp_ux_HPSBUX02313.nasl
+	scripts/gb_hp_ux_HPSBUX00187.nasl
+	scripts/gb_hp_ux_HPSBUX00209.nasl
+	scripts/gb_hp_ux_HPSBUX00295.nasl:
+	Added HP-UX Local Security Checks
+
 2009-05-04 Michael Meyer <mime at gmx.de>
 	* scripts/webcalendar_detect.nasl
 	scripts/jetty_34800.nasl:

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00111.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00111.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00111.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Ignite-UX HPSBUX00111
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835064);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00111");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Ignite-UX HPSBUX00111");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Ignite-UX. The vulnerability could be exploited to allow remote unauthorized 
+  access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  Ignite-UX on
+  HP-UX B.11.00 and B.11.11 running Ignite-UX. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00899026-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Ignite-UX");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"B.2.4.307", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"B.2.4.307", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00129.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00129.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00129.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,193 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for MC/ServiceGuard HPSBUX00129
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835127);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00129");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for MC/ServiceGuard HPSBUX00129");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with 
+  MC/ServiceGuardrunning on HP-UX. The vulnerability could be exploitedlocally 
+  to create a denial of service (DoS). 
+
+  Impact:
+  Local denial of service (DoS)
+
+  Affected Software/OS:
+  MC/ServiceGuard on
+  HP-UX release B.11.00 and B.11.11, running 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00993861-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of MC/ServiceGuard");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"DLM.CM-DLM", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DLM.CM-DLM-CMDS", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DLM-Clust-Mon.CM-CORE", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Cluster-Monitor.CM-CORE", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DLM-Pkg-Mgr.CM-PKG", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Package-Manager.CM-PKG", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CM-Provider-MOF.CM-MOF", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CM-Provider-MOF.CM-PROVIDER", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ATS-CORE.ATS-RUN", patch_list:['PHSS_22540'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"DLM.CM-DLM", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DLM.CM-DLM-CMDS", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DLM-Clust-Mon.CM-CORE", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Cluster-Monitor.CM-CORE", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DLM-Pkg-Mgr.CM-PKG", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Package-Manager.CM-PKG", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CM-Provider-MOF.CM-MOF", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CM-Provider-MOF.CM-PROVIDER", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ATS-CORE.ATS-RUN", patch_list:['PHSS_22540'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00132.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00132.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00132.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,238 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for JRE and JDK HPSBUX00132
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835059);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00132");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for JRE and JDK HPSBUX00132");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with Java 1.1 and 1.2 
+  applicationsrunning on HP-UX. The vulnerability could be exploitedremotely 
+  to create an unauthorized access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  JRE and JDK on
+  HP-UX release B.10.20, B.10.24, B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00993897-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of JRE and JDK");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.1", revision:"1.1.8.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3", revision:"1.3.0.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.1", revision:"1.1.8.04", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.04", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.1", revision:"1.1.8.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3", revision:"1.3.0.00", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.1", revision:"1.1.8.04", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.04", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.1", revision:"1.1.8.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3", revision:"1.3.0.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00133.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00133.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00133.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ContinentalClusters HPSBUX00133
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835089);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00133");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ContinentalClusters HPSBUX00133");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ContinentalClusters. The vulnerability could be exploitedremotely to create 
+  an unauthorized access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  ContinentalClusters on
+  HP-UX release B.11.00 and B.11.11 running 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00993922-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ContinentalClusters");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"ContClusters.CM-JRE", patch_list:['PHSS_22678'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"ContClusters.CM-JRE", patch_list:['PHSS_22678'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00137.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00137.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00137.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Support Tools Manager HPSBUX00137
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835038);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00137");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Support Tools Manager HPSBUX00137");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Support Tools Manager. The vulnerability could be exploited to allow a local 
+  Denial of Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  Support Tools Manager on
+  HP-UX B.10.20, B.11.00, B.11.11 running Support Tools Manager 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912118-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Support Tools Manager");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Sup-Tool-Mgr", revision:"B.11.00.13.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"Sup-Tool-Mgr", revision:"B.10.20.18", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Sup-Tool-Mgr", patch_list:['PHSS_23067'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00141.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,286 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for JRE HPSBUX00141
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835115);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00141");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for JRE HPSBUX00141");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with Java 1.1 and 1.2 
+  applicationsrunning on HP-UX. The vulnerability could be exploitedremotely 
+  as unauthorized command execution. 
+
+  Impact:
+  Remote unauthorized command execution
+
+  Affected Software/OS:
+  JRE on
+  HP-UX releases B.10.20, B.10.24, B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00993945-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of JRE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK  1.1", revision:"1.1.8.05", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.05", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.07", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.07", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK1.3", revision:"1.3.0.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK  1.1", revision:"1.1.8.05", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.05", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.07", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.07", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK1.3", revision:"1.3.0.00", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK  1.1", revision:"1.1.8.05", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.05", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.07", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.07", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK1.3", revision:"1.3.0.00", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK  1.1", revision:"1.1.8.05", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.05", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.07", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.07", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK1.3", revision:"1.3.0.00", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"JDK  1.1", revision:"1.1.8.05", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.05", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2", revision:"1.2.2.07", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.2.2.07", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK1.3", revision:"1.3.0.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.3.0.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00144.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00144.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00144.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,156 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND HPSBUX00144
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835003);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00144");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for BIND HPSBUX00144");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  BIND. The vulnerability could be exploitedremotely to create a denial of 
+  service (DoS). 
+
+  Impact:
+  Remote denial of service (DoS)
+
+  Affected Software/OS:
+  BIND on
+  HP-UX releases B.11.11, B.11.04, B.11.00, B.10.24, B.10.20, B.10.10, and 
+  B.10.01 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00993980-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of BIND");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.01")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23277'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23277'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23274'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", revision:"8.1.3", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23439'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23277'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23275'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00147.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00147.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00147.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for newgrp(1) HPSBUX00147
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835063);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00147");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for newgrp(1) HPSBUX00147");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in the HP-UX 
+  newgrp(1) command. The vulnerability could be exploitedlocally to gain 
+  increased privilege. 
+
+  Impact:
+  Local increased privilege.
+
+  Affected Software/OS:
+  newgrp(1) on
+  HP-UX release B.11.11 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994012-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of newgrp(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CMDS-AUX", patch_list:['PHCO_23083'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,163 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for xntpd(1M) HPSBUX00148
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835070);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00148");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for xntpd(1M) HPSBUX00148");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  xntpd(1M). The vulnerability could be exploitedremotely execute arbitrary 
+  commands, with increased privilege. 
+
+  Impact:
+  Remote execution of arbitrary commands
+  increased privilege.
+
+  Affected Software/OS:
+  xntpd(1M) on
+  HP-UX release B.11.11, B.11.04, B.11.00, B.10.24, B.10.20, B.10.10, B.10.01. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994050-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of xntpd(1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.01")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_23717'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_23717'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_23697'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_24076'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_24077'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_23717'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_22722'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00151.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00151.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00151.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,354 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CDE HPSBUX00151
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835112);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00151");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for CDE HPSBUX00151");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  CDE. The vulnerability could be exploitedlocally to gain increased privilege 
+  or create a denial of service (DoS). 
+
+  Impact:
+  Local increased privilege
+  denial of service (DoS)
+
+  Affected Software/OS:
+  CDE on
+  HP-UX B.10.10, B.10.20, B.10.24, B.11.00, B.11.04 and B.11.11 running CDE. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994219-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CDE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_23355'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_23355'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_23355'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_23355'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_23355'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE-TT", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-HELP", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_23797'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_24097'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN CDE.CDE-RUN", patch_list:['PHSS_24097'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_24097'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-PAM CDE.CDE-SHLIBS", patch_list:['PHSS_24097'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT CDE.CDE-DTTERM", patch_list:['PHSS_24097'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-HELP", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_24098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-PAM", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_23796'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_24087 PHSS_24091'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_24087 PHSS_24091'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00153.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00153.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00153.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,111 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for kmmodreg (1M) HPSBUX00153
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835020);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00153");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for kmmodreg (1M) HPSBUX00153");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  the /usr/sbin/kmmodreg command. The vulnerability could be exploitedlocally 
+  to create a denial of service (DoS) or gain increased privilege. 
+
+  Impact:
+  Local denial of service (DoS)
+  increased privilege.
+
+  Affected Software/OS:
+  kmmodreg (1M) on
+  HP-UX B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994211-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of kmmodreg (1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", patch_list:['PHCO_24112'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", patch_list:['PHCO_24197'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", patch_list:['PHCO_24147'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00156.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00156.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00156.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,206 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for setrlimit(1M) HPSBUX00156
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835074);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00156");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for setrlimit(1M) HPSBUX00156");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  setrlimit(1M), where setrlimit() may allow incorrect core files and cause a 
+  Denial of Service (DoS). 
+
+  Impact:
+  Denial of Service (DoS).
+
+  Affected Software/OS:
+  setrlimit(1M) on
+  HP 9000 Series 700/800 running HP-UX B.10.01, B.10.10, B.10.20, B.10.24, 
+  B.10.26 and HP-UX B.11.00, B11.04 and B.11.11 running setrlimit(1M). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00968563-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of setrlimit(1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.01")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_23512/PACHRDME/English]'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_23513'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_23477/PACHRDME/English]'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_23478/PACHRDME/English]'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_23628/PACHRDME/English]'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_24249/PACHRDME/English]'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_24250/PACHRDME/English]'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.26")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_25243/PACHRDME/English]'], rls:"HPUX10.26"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_25244/PACHRDME/English]'], rls:"HPUX10.26"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_23886/PACHRDME/English]'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_22701/PACHRDME/English]'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_22702/PACHRDME/English]'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"setrlimit(1M)", patch_list:['PHKL_23423/PACHRDME/English]'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00159.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00159.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00159.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for dlkm HPSBUX00159
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835079);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00159");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for dlkm HPSBUX00159");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX dlkm. The 
+  vulnerability could be exploitedlocally to create an unauthorized increase 
+  in privilege. 
+
+  Impact:
+  Local unauthorized increase in privilege.
+
+  Affected Software/OS:
+  dlkm on
+  HP-UX B.11.11 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912029-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of dlkm");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", patch_list:['PHCO_23492'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00160.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00160.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00160.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,179 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for login(1) HPSBUX00160
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835106);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00160");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for login(1) HPSBUX00160");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  login(1). The vulnerability could be exploitedlocally to gain increased 
+  privilege. 
+
+  Impact:
+  Local increased privilege.
+
+  Affected Software/OS:
+  login(1) on
+  HP-UX release B.10.20, B.10.24, B.10.26, B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994275-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of login(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_24083'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHNE_24394'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-ENG-A-MAN", patch_list:['PHNE_24394'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VirtualVaultOS.VVOS-AUX-IA", patch_list:['PHNE_24394'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-INETD", patch_list:['PHNE_24394'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_24394'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_24394'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.26")
+{
+
+  if(ishpuxpkgvuln(pkg:"BLS.BLS-CORE", patch_list:['PHCO_24454'], rls:"HPUX10.26"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_24418'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_24267'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_23900'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00162.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00162.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00162.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,163 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ftp and ftpd HPSBUX00162
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835047);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00162");
+  script_cve_id("CVE-2001-07");
+  script_name(english: "HP-UX Update for ftp and ftpd HPSBUX00162");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ftp and ftpd. The vulnerability could be exploited to allow remote 
+  unauthorized access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  ftp and ftpd on
+  HP-UX B.10.01, B.10.10, B.10.20, B.10.24, B.11.00, B.11.04, and B.11.11 
+  running ftp and ftpd. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00898886-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ftp and ftpd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.01")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23947'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23947'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23949'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_24394'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_24395'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_23948'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_23950'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00163.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00163.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00163.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,150 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rlpdaemon HPSBUX00163
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835147);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00163");
+  script_cve_id("CAN-2001-0668");
+  script_name(english: "HP-UX Update for rlpdaemon HPSBUX00163");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  login(1). The vulnerability could be exploitedremotely to gain unauthorized 
+  access or increased privilege. 
+
+  Impact:
+  Remote unauthorized access
+  increased privilege.
+
+  Affected Software/OS:
+  rlpdaemon on
+  HP-UX release B.10.01, B.10.10, B.10.20, B.11.00, B.11.11, and B.11.20. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994294-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rlpdaemon");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.01")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_24697'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_24698'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_24700'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_24699'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_24868'], rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_24701'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,128 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for PRM or WLM HPSBUX00165
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835024);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00165");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for PRM or WLM HPSBUX00165");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Process Resource Manager (PRM) or Workload Manager (WLM). The vulnerability 
+  could be exploitedlocally to allow increased privilege. 
+
+  Impact:
+  Local increased privilege.
+
+  Affected Software/OS:
+  PRM or WLM on
+  HP-UX release B.10.20, B.11.00, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994462-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of PRM or WLM");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Proc-Resrc-Mgr.PRM-RUN", patch_list:['PHSS_24864'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PRM-Sw-Lib.PRM-LIB", patch_list:['PHSS_24864'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"Proc-Resrc-Mgr.PRM-RUN", patch_list:['PHSS_24863'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PRM-Sw-Lib.PRM-LIB", patch_list:['PHSS_24863'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Proc-Resrc-Mgr.PRM-RUN", patch_list:['PHSS_24864'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PRM-Sw-Lib.PRM-LIB", patch_list:['PHSS_24864'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00167.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00167.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00167.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,149 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for cu(1) HPSBUX00167
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835001);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00167");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for cu(1) HPSBUX00167");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  cu(1). The vulnerability could be exploitedlocally to create a denial of 
+  service (DoS). 
+
+  Impact:
+  Local denial of service (DoS)
+
+  Affected Software/OS:
+  cu(1) on
+  HP-UX release B.10.01, B.10.10, B.10.20, B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994260-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of cu(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.01")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemComm.SYSCOM", patch_list:['PHCO_22763'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemComm.SYSCOM", patch_list:['PHCO_22765'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemComm.SYSCOM", patch_list:['PHCO_22766'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemComm.SYSCOM", patch_list:['PHCO_23424'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemComm.SYSCOM", patch_list:['PHCO_22764'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemComm.SYSCOM", patch_list:['PHCO_23909'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00168.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00168.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00168.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,390 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rpc.ttdbserverd HPSBUX00168
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835100);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00168");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for rpc.ttdbserverd HPSBUX00168");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  rpc.ttdbserverd. The vulnerability could be exploitedremotely to gain 
+  unauthorized access or increased privilege. 
+
+  Impact:
+  Remote unauthorized access
+  increased privilege.
+
+  Affected Software/OS:
+  rpc.ttdbserverd on
+  HP-UX release B.10.10, B.10.20, B.10.24, B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994228-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rpc.ttdbserverd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25136'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25136'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25136'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25136'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25136'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-HELP", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_25138'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-PAM", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_25419'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-HELP", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_25420'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-PAM", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_25137'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25139'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25139'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25139'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rpcbind Software HPSBUX00169
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835134);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00169");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for rpcbind Software HPSBUX00169");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  rpcbind, where certain RPC Portmap Requests may cause rpcbind to coredump 
+  and cause a Denial of Service (DoS). 
+
+  Impact:
+  Denial of Service (DoS).
+
+  Affected Software/OS:
+  rpcbind Software on
+  HP-UX B.11.00, B.11.04 and B.11.11 on HP9000 Series 700/800 running rpcbind. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00979921-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rpcbind Software");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"rpcbind", patch_list:['PHNE_24034/PACHRDME/English'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"rpcbind", patch_list:['PHNE_25077/PACHRDME/English'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"rpcbind", patch_list:['PHNE_24035'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00175.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00175.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00175.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,427 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CDE dtspcd HPSBUX00175
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835016);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00175");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for CDE dtspcd HPSBUX00175");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  CDE dtspcd. The vulnerability could be exploitedremotely to gain 
+  unauthorized access, increased privilege, or execution of arbitrary code. 
+
+  Impact:
+  Remote unauthorized access
+  increased privilege
+  arbitrary code execution.
+
+  Affected Software/OS:
+  CDE dtspcd on
+  HP-UX release B.10.10, B.10.20, B10.24, B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994317-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CDE dtspcd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_25785'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25785'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25785'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25785'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25785'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25785'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25785'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-HELP", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_25787'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-PAM", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_26029'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-HELP", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_26030'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-HELP-RUN", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-PAM", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MAN", patch_list:['PHSS_25786'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_25788'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_25788'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SCH-H-MSG", patch_list:['PHSS_25788'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SWE-I-MSG", patch_list:['PHSS_25788'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_25788'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_25788'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_25788'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,130 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Filesystem Deadlock HPSBUX00178
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835027);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00178");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Filesystem Deadlock HPSBUX00178");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX filesystem 
+  deadlock software, where a local user may exploit a filesystem weakness to 
+  cause a Denial of Service (DoS) 
+
+  Impact:
+  Local Denial of Service (DoS).
+
+  Affected Software/OS:
+  Filesystem Deadlock on
+  HP-UX B.10.20, B.10.24, B.11.00, B.11.04 and B.11.11 on HP 9000 Series 
+  700/800 filesystem deadlock software. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00967116-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Filesystem Deadlock");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"filesystem deadlock", patch_list:['PHKL_22932/PACHRDME/English'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"filesystem deadlock", patch_list:['PHKL_25033/PACHRDME/English'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"filesystem deadlock", patch_list:['PHKL_24517/PACHRDME/English'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"filesystem deadlock", patch_list:['PHKL_24518/PACHRDME/English'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"filesystem deadlock", patch_list:['PHKL_23335'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,136 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for running sendmail(1M) HPSBUX00179
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835160);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00179");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for running sendmail(1M) HPSBUX00179");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  sendmail(1M). The vulnerability could be exploitedremotely to gain 
+  unauthorized access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  running sendmail(1M) on
+  HP-UX release B.10.20, B.10.24, B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994295-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of running sendmail(1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_24419'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_26003'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_25984'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_25183'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_25184'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00180.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00180.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00180.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for WU-FTPD HPSBUX00180
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835156);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00180");
+  script_cve_id("CAN-2001-0187");
+  script_name(english: "HP-UX Update for WU-FTPD HPSBUX00180");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  WU-FTPD 2.6, where a remote user may execute arbitrary code on the server. 
+
+  Impact:
+  
+
+  Affected Software/OS:
+  WU-FTPD on
+  HP-UX B.11.00, B.11.11 running WU-FTPD 2.6. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00906124-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of WU-FTPD");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.00.01.002", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.11.01.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00181.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00181.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00181.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for IPFilter/9000 HPSBUX00181
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835105);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00181");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for IPFilter/9000 HPSBUX00181");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  IPFilter/9000 software, where a local user may obtain an increase in 
+  privileges and change IPFilter's handling of packets. 
+
+  Impact:
+  Local increase in  privileges.
+
+  Affected Software/OS:
+  IPFilter/9000 on
+  HP-UX B.11.00 and B.11.11 running IPFilter/9000 software. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00968125-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of IPFilter/9000");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPFilter/9000", revision:"9000", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPFilter/9000", revision:"9000", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00183.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00183.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00183.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX00183
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835043);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00183");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX00183");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX. The 
+  vulnerability could be exploited by a local user to create a Denial of 
+  Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.11 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00995127-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHKL_26233'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00187.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00187.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00187.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,158 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for JRE Bytecode Verifier HPSBUX00187
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835132);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00187");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for JRE Bytecode Verifier HPSBUX00187");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in Java(TM) Java Runtime Environment (JRE) Bytecode Verifier 
+  may allow remote unauthorized access. 
+
+  Impact:
+  Remote increased privilege.
+
+  Affected Software/OS:
+  JRE Bytecode Verifier on
+  HP-UX B.10.20, B.11.00, B.11.11, B.11.23 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035761-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of JRE Bytecode Verifier");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.06", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.1.8.06", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.1.8.06", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.1.8.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.1.8.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.06", rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.1", revision:"1.1.8.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2", revision:"1.1.8.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3", revision:"1.1.8.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00188.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00188.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00188.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,122 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for JAVA Web Start HPSBUX00188
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835048);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00188");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for JAVA Web Start HPSBUX00188");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in Java(TM) Web Start may allow an applicationremote 
+  unauthorized access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  JAVA Web Start on
+  HP-UX B.11.XX running Java Web Start. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035756-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of JAVA Web Start");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"webstart_10101", revision:"1.0.1.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"webstart_10101", revision:"1.0.1.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"webstart_10101", revision:"1.0.1.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"webstart_10101", revision:"1.0.1.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00191.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00191.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00191.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for passwd(1) HPSBUX00191
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835041);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00191");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for passwd(1) HPSBUX00191");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  passwd(1). The vulnerability could be exploitedlocally to create denial of 
+  service (DoS). 
+
+  Impact:
+  Local denial of service (DoS).
+
+  Affected Software/OS:
+  passwd(1) on
+  HP-UX release B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994344-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of passwd(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_25527'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_26904'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_24839'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00192.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00192.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00192.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,144 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ndd(1M) HPSBUX00192
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835032);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00192");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ndd(1M) HPSBUX00192");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ndd(1M). The vulnerability could be exploitedlocally to create a denial of 
+  service. 
+
+  Impact:
+  Local denial of service (DoS)
+
+  Affected Software/OS:
+  ndd(1M) on
+  HP-UX release B.11.11 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994439-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ndd(1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-PRG", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN-64", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NW-ENG-A-MAN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.C-INC", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NMS2-KRN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.SYS-ADMIN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00194.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00194.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00194.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,182 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for SD HPSBUX00194
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835011);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00194");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for SD HPSBUX00194");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Software Distributor (SD). The vulnerability could be exploitedlocally to 
+  permit unauthorized access or to create a denial of service (DoS). 
+
+  Impact:
+  Local unauthorized access
+  denial of service (DoS)
+
+  Affected Software/OS:
+  SD on
+  HP-UX release B.11.00, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994461-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of SD");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-AGENT", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-CMDS", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-E-MSG", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-S-MSG", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-ENG-A-MAN", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-FAL", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-HELP", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-E-HELP", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-E-MAN", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-S-HELP", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-S-MAN", patch_list:['PHCO_25875'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-AGENT", patch_list:['PHCO_25887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-CMDS", patch_list:['PHCO_25887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-HELP", patch_list:['PHCO_25887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-E-HELP", patch_list:['PHCO_25887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-JPN-S-HELP", patch_list:['PHCO_25887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00197.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00197.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00197.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,269 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX00197
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835025);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00197");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Apache HPSBUX00197");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  Apache that may allow a remote user to cause a Denial of Service (DoS) or 
+  elevation of privilege or execution of arbitrary code. 
+
+  Impact:
+  
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.20, and B.11.23 running Apache and 
+  OpenView Network Node Manager (NNM) 6.01, 6.1, 6.2, 6.31 and Solaris 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00904239-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.26.05", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.39.05", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_29987'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_27639'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_27784'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPOVSIP.OVSIP", patch_list:['PHSS_27547'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.26.05", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.39.05", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.26.05", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.39.05", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_27638'], rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_27935'], rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_27783'], rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.26.05", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.39.05", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_27371', 'PHSS_27477'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS", patch_list:['PHSS_27371', 'PHSS_27477'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-CORE-CMN", patch_list:['PHSS_27371', 'PHSS_27477'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_27361', 'PHSS_27423'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS", patch_list:['PHSS_27361', 'PHSS_27423'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-CORE-CMN", patch_list:['PHSS_27361', 'PHSS_27423'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.26.05", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.39.05", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_29987'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_27639'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVPlatform.OVWWW-SRV", patch_list:['PHSS_27784'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPOVSIP.OVSIP", patch_list:['PHSS_27547'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00198.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00198.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00198.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,98 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Advanced Server/9000 for HP-UX (AS/U) RFC-Netbios HPSBUX00198
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835120);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00198");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Advanced Server/9000 for HP-UX (AS/U) RFC-Netbios HPSBUX00198");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Advanced Server/9000 for HP-UX (AS/U) RFC-Netbios. The vulnerability could 
+  be exploited remotely to create a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Advanced Server/9000 for HP-UX (AS/U) RFC-Netbios on
+  HP-UX B.11.00, B.11.11 running Advanced Server/9000 for HP-UX (AS/U) 
+  versions B.04.05, B.04.06, B.04.07, B.04.08, B.04.09. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00966847-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Advanced Server/9000 for HP-UX (AS/U) RFC-Netbios");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"RFC-NETBIOS.RFC-NETBIOS", patch_list:['PHNE_26988'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"RFC-NETBIOS.RFC-NETBIOS", patch_list:['PHNE_26988'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00199.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00199.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00199.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,138 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rpc.ttdbserver HPSBUX00199
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835012);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00199");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for rpc.ttdbserver HPSBUX00199");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  rpc.ttdbserver. The vulnerability could be exploited remotely to create a 
+  Denial of Service(DoS) or to increase privileges. 
+
+  Impact:
+  Remote Denial of Service(DoS)
+  privilege increase
+
+  Affected Software/OS:
+  rpc.ttdbserver on
+  HP-UX B.10.10, B.10.20, B.10.24, B.11.00, B.11.04, and B.11.11 running 
+  rpc.ttdbserver. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00965432-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rpc.ttdbserver");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_27427'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_28173'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_28174'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_27426'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_27428'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00202.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00202.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00202.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Bindv920 HPSBUX00202
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835028);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00202");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Bindv920 HPSBUX00202");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in HP-UX with the 
+  BINDv920.INETSVCS-BIND fileset installed. This could be remotely exploited 
+  to cause a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Bindv920 on
+  HP-UX B.11.11 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957835-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Bindv920");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.11.01.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00205.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00205.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00205.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,109 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ARPA Transport HPSBUX00205
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835185);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00205");
+  script_cve_id("CVE-2001-0328");
+  script_name(english: "HP-UX Update for ARPA Transport HPSBUX00205");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  TCP Initial Sequence Number (ISN) randomization specified in RFC 1948 is 
+  available for HP-UX. 
+
+  Impact:
+  Advisory only.
+
+  Affected Software/OS:
+  ARPA Transport on
+  HP-UX B.11.00, B.11.04, B.11.11 running ARPA Transport. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01336000-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ARPA Transport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_26771'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_26101'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_25644'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00206.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00206.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00206.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,109 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ptrace(2) HPSBUX00206
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835060);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00206");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ptrace(2) HPSBUX00206");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in the ptrace(2) may allow local users to create a denial of 
+  service (DoS). 
+
+  Impact:
+  Local denial of service (DoS)
+
+  Affected Software/OS:
+  ptrace(2) on
+  HP-UX release B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035655-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ptrace(2)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHKL_27180'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHKL_27536'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHKL_27179'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00207.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00207.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00207.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,172 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache PHP HPSBUX00207
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835040);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00207");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Apache PHP HPSBUX00207");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  Apache PHP where a remote user may cause a Denial of Service (DoS) or gain 
+  increased privileges or execution of arbitrary code. 
+
+  Impact:
+  Remote Denial of Service (DoS) or  increased privileges or execution of arbitrary code.
+
+  Affected Software/OS:
+  Apache PHP on
+  HP-UX B.11.00, B.11.11, B.11.20, B.11.22 running the ApacheStrong or 
+  HPApache HP-UX Apache-based Web 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00943248-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache PHP");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.26.03", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP", revision:"2.0.0.00.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP2", revision:"2.0.0.00.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.26.03", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP", revision:"2.0.0.00.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP2", revision:"2.0.0.00.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.26.03", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP", revision:"2.0.0.00.11", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP2", revision:"2.0.0.00.11", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.26.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP", revision:"2.0.0.00.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.PHP2", revision:"2.0.0.00.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00209.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00209.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00209.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,312 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for DNS and Resolver Libraries HPSBUX00209
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835151);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00209");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for DNS and Resolver Libraries HPSBUX00209");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in HP-UX DNS and resolver libraries which may allow remote 
+  execution of arbitrary code or creation of a denial of service (DoS). 
+
+  Impact:
+  Remote execution of arbitrary code or creation of a denial of service (DoS)
+
+  Affected Software/OS:
+  DNS and Resolver Libraries on
+  HP-UX releases B.10.10, B.10.20, B.10.24 (VVOS), B.11.00, B.11.04 (VVOS), 
+  B.11.11 and B.11.22. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957990-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of DNS and Resolver Libraries");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_27792'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", revision:".1.1010", rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv812.INETSVCS-BIND", revision:"B.11.00.01.004", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.00.01.001", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"bind.INETSVCS-RUN", patch_list:['PHNE_28449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"upgrade_bind812.INETSVCS-RUN", patch_list:['PHNE_28449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BINDv913.INETSVCS-BIND", patch_list:['PHNE_28449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_27795'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_27795'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_27879'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_27882'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_27882'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_27882'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_27882'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29634'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_27881'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_27881'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_27792'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_28490'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_28299'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_28299'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv913.INETSVCS-BIND", revision:"B.11.11.01.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BIND.INETSVCS-RUN", revision:"B.11.11.01.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.11.01.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28450'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_27796'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_27796'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00213.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00213.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00213.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,109 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for LP subsystem HPSBUX00213
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835010);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00213");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for LP subsystem HPSBUX00213");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in the lp subsystem may allow local users to create a denial 
+  of service (DoS). 
+
+  Impact:
+  Local denial of service in lp subsystem.
+
+  Affected Software/OS:
+  LP subsystem on
+  HP-UX release B.10.20, B.11.00, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035668-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of LP subsystem");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_27132'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_27133'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_27020'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00215.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00215.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00215.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,211 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for XDR Library HPSBUX00215
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835062);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00215");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for XDR Library HPSBUX00215");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified with HP-UX running XDR 
+  libraries where an unprivileged local user may be able to gain unauthorized 
+  access or create a denial of service (DoS). 
+
+  Impact:
+  Local unauthorized access
+  denial of service (DoS)
+
+  Affected Software/OS:
+  XDR Library on
+  HP-UX B.10.20, B.10.24, B.10.26, B.11.00, B.11.04, B.11.11, and B.11.22 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958066-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of XDR Library");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_28102'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_28102'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_28480'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_27882'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.26")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_28128'], rls:"HPUX10.26"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", revision:".1.64", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", revision:".1.32", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", revision:".1", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_28138'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_28138'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-SHLIBS", revision:".1", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_28103'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_28103'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_28481'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00221.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00221.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00221.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,169 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for LDAP-UX Integration HPSBUX00221
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835013);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00221");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for LDAP-UX Integration HPSBUX00221");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has beenidentified with HP-UX running the 
+  LPAD-UX Integration product, where the vulnerability could beexploited 
+  remotely to gain increased privilege. 
+
+  Impact:
+  Remote increased privilege
+
+  Affected Software/OS:
+  LDAP-UX Integration on
+  HP-UX B.11.00 and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035736-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of LDAP-UX Integration");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.ADMIN-RUN", revision:"B.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.CORE-RUN", revision:"B.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDAP-C-SDK", revision:"B.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDUX-ENG-A-MAN", revision:"B.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.NATIVELDAP-RUN", revision:"B.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.PAM-AUTHZ-RUN", revision:"B.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NisLdapServer.YPLDAP-SERVER", revision:"B.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.ADMIN-RUN", revision:"B.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.CORE-RUN", revision:"B.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDAP-C-SDK", revision:"B.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDUX-ENG-A-MAN", revision:"B.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.NATIVELDAP-RUN", revision:"B.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.PAM-AUTHZ-RUN", revision:"B.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NisLdapServer.YPLDAP-SERVER", revision:"B.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00224.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00224.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00224.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,241 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX00224
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835104);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00224");
+  script_cve_id("CAN-2002-0839", "CAN-2002-0840", "CAN-2002-0843", "CAN-2002-1156");
+  script_name(english: "HP-UX Update for Apache HPSBUX00224");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  Apache that may allow a user to gain increased privileges or Denial of 
+  Service (DoS) or execution of arbitrary code. 
+
+  Impact:
+  Increased privileges or Denial of Service (DoS) or execution of arbitrary code.
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.00, B.11.11, B.11.20 and B.11.22 running the ApacheStrong or 
+  HPApache HP-UX Apache-based Web Servers. HP-UX B.11.04 running Virtualvault 
+  4.5 or HP-UX and Solaris running OV-NNM6.2. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00944288-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.43.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVNNMgr.OVNNM-RUN", patch_list:['PHSS_28705'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVNNMgr.OVRPT-RUN", patch_list:['PHSS_28705'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_28111', 'PHSS_28098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS", patch_list:['PHSS_28111', 'PHSS_28098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS-JK", patch_list:['PHSS_28111', 'PHSS_28098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-CORE-CMN", patch_list:['PHSS_28111', 'PHSS_28098'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_28090', 'PHSS_28099'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS", patch_list:['PHSS_28090', 'PHSS_28099'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-CORE-CMN", patch_list:['PHSS_28090', 'PHSS_28099'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OVNNMgr.OVNNM-RUN", patch_list:['PHSS_28704'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVNNMgr.OVRPT-RUN", patch_list:['PHSS_28704'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.43.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.00", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.43.00", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache", revision:"2.0.43.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVNNMgr.OVNNM-RUN", patch_list:['PHSS_28705'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVNNMgr.OVRPT-RUN", patch_list:['PHSS_28705'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,150 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for X Font Server (xfs) Software HPSBUX00228
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835159);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00228");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for X Font Server (xfs) Software HPSBUX00228");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running X 
+  Font Server (xfs) software, where a buffer overflowmay allow a remote user 
+  to obtain unauthorized access or cause a Denial of Service (DoS). 
+
+  Impact:
+  Remote unauthorized access or Denial of Service (DoS).
+
+  Affected Software/OS:
+  X Font Server (xfs) Software on
+  HP-UX B.10.10, B.10.20, B.10.24, B.11.00, B.11.04, B.11.11 and B.11.22 on HP 
+  9000 Series 700 and 800 running X Font Server (xfs) software. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00965492-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of X Font Server (xfs) Software");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"X Font Server (xfs)", patch_list:['PHSS_28469'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"X Font Server (xfs)", revision:"10.20", rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"X Font Server (xfs)", revision:"11.00", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"X Font Server (xfs)", patch_list:['PHSS_28468'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"X Font Server (xfs)", patch_list:['PHSS_28471'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"X Font Server (xfs)", patch_list:['PHSS_28470'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00232.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00232.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00232.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,160 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for xntpd HPSBUX00232
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835161);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00232");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for xntpd HPSBUX00232");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in HP-UX running xntpd which may allow aremote user to 
+  create a denial of service (DoS). 
+
+  Impact:
+  Remote denial of service (DoS)
+
+  Affected Software/OS:
+  xntpd on
+  HP-UX B.10.20, B.10.24, B.11.00, B.11.04, and B.11.11 using the xntpd 
+  software. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035763-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of xntpd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_27223'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_27223'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.24")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_28002'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_28002'], rls:"HPUX10.24"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_27442'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_27442'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_24510'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_24510'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_24512'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00233.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00233.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00233.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,118 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND HPSBUX00233
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835099);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00233");
+  script_cve_id("CAN-2002-1219", "CAN-2002-1220", "CAN-2002-1221", "CAN-2002-0029");
+  script_name(english: "HP-UX Update for BIND HPSBUX00233");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in BIND DNS resolver libraries may allow remote attackers to 
+  execute arbitrary code with the privileges of the user running named, 
+  typically root or to create a denial of service (DoS). 
+
+  Impact:
+  Execution of arbitrary code
+  denial of service (DoS).
+
+  Affected Software/OS:
+  BIND on
+  HP-UX releases B.10.10, B.10.20, B.11.00, B.11.04 (VVOS), and B.11.11 
+  running BIND 4.9.7 or BIND-8.1.2. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957868-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of BIND");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv812.INETSVCS-BIND", revision:"B.11.00.01.004", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29634'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28450'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00237.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00237.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00237.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,151 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for sort HPSBUX00237
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835051);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00237");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for sort HPSBUX00237");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  sort. The vulnerability could be exploited to allow remote unauthorized 
+  access or a Denial of Service (DoS) 
+
+  Impact:
+  Remote unauthorized access
+  Denial of Service (DoS)
+
+  Affected Software/OS:
+  sort on
+  HP9000 Series 700/800 running HP-UX HP-UX B.10.01, B.10.10, B.10.20, 
+  B.11.04, B.11.11 only. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00965470-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of sort");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX10.01")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_28142'], rls:"HPUX10.01"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.10")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_27940'], rls:"HPUX10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_27565'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_28467'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_27564'], rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_25918'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00242.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00242.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00242.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,124 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rpc.yppasswdd HPSBUX00242
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835143);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00242");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for rpc.yppasswdd HPSBUX00242");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  rpc.yppasswdd, where the vulnerability may be exploited remotely to create a 
+  Denial of Service (DoS) and gain unauthorized access. 
+
+  Impact:
+  Remote Denial of Service (DoS)
+  unauthorized access
+
+  Affected Software/OS:
+  rpc.yppasswdd on
+  HP-UX B.10.10, B.10.20, B.11.00, B.11.11, B.11.22 using rpc.yppasswdd. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958271-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rpc.yppasswdd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_28102'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_28138'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_28886'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_28103'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00246.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00246.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00246.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,154 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for sendmail HPSBUX00246
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835021);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00246");
+  script_cve_id("CAN-2002-1337");
+  script_name(english: "HP-UX Update for sendmail HPSBUX00246");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  sendmail, where the vulnerability may be exploited remotely to gain 
+  unauthorized access and create a Denial of Service (DoS). 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  sendmail on
+  HP-UX B.10.10, B.10.20, B.11.00, B.11.04, B.11.11, and B.11.22 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958338-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of sendmail");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_28409'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28409'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.00.01.004", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29526'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28760'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.11.01.005", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,196 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Tomcat HPSBUX00249
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835152);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00249");
+  script_cve_id("CAN-2003-0042", "CAN-2003-0043", "CAN-2003-0044");
+  script_name(english: "HP-UX Update for Tomcat HPSBUX00249");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running HP 
+  Tomcat v 3.3.1. This vulnerability may allow a remote user to gain 
+  unauthorized access or execution of arbitrary code. 
+
+  Impact:
+  Remote unauthorized access or execution of arbitrary code.
+
+  Affected Software/OS:
+  Tomcat on
+  HP-UX B.11.00, B.11.11, B.11.22 and B.11.23 running HP Tomcat version 3.3.1 
+  or prior versions. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00943079-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Tomcat");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.TOMCAT", revision:"3.3.1a", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.TOMCAT", revision:"A.1.0.10.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.TOMCAT2", revision:"A.1.0.10.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsTOMCAT.TOMCAT", revision:"A.1.0.10.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsTOMCAT.TOMCAT2", revision:"A.1.0.10.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.TOMCAT", revision:"3.3.1a", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.TOMCAT", revision:"A.1.0.10.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.TOMCAT2", revision:"A.1.0.10.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsTOMCAT.TOMCAT", revision:"A.1.0.10.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsTOMCAT.TOMCAT2", revision:"A.1.0.10.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.TOMCAT", revision:"3.3.1a", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.TOMCAT", revision:"3.3.1a", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.TOMCAT", revision:"A.1.0.10.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.TOMCAT2", revision:"A.1.0.10.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsTOMCAT.TOMCAT", revision:"A.1.0.10.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsTOMCAT.TOMCAT2", revision:"A.1.0.10.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00250.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00250.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00250.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,177 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Webmin HPSBUX00250
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835084);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00250");
+  script_cve_id("CAN-2003-0101");
+  script_name(english: "HP-UX Update for Webmin HPSBUX00250");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Webmin. The vulnerability could be exploited to allow remote unauthorized 
+  root access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  Webmin on
+  HP-UX B.11.00, B.11.11, B.11.20, and B.11.22 running 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00954482-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Webmin");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.WEBMIN", revision:"A.1.0.01.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsWEBMIN.HPDOCS", revision:"A.1.0.01.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsWEBMIN.WEBMIN", revision:"A.1.0.01.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.WEBMIN", revision:"A.1.0.01.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsWEBMIN.HPDOCS", revision:"A.1.0.01.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsWEBMIN.WEBMIN", revision:"A.1.0.01.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.01", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong.APACHE-STRONG", revision:"1.3.27.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HPApache.WEBMIN", revision:"A.1.0.01.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsWEBMIN.HPDOCS", revision:"A.1.0.01.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsWEBMIN.WEBMIN", revision:"A.1.0.01.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00251.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00251.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00251.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,164 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CIFS Server (Samba) HPSBUX00251
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835069);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00251");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for CIFS Server (Samba) HPSBUX00251");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  CIFS Server (Samba).This vulnerability may allow a remote unauthorized user 
+  to gain root access. 
+
+  Impact:
+  Remote unauthorized root access
+
+  Affected Software/OS:
+  CIFS Server (Samba) on
+  HP-UX B.11.00, B.11.11, B.11.22 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00956321-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CIFS Server (Samba)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00252.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00252.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00252.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,198 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for RPC HPSBUX00252
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835057);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00252");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for RPC HPSBUX00252");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  RPC. The vulnerability could be exploited to allow remote unauthorized 
+  access or Denial of Service (DoS). 
+
+  Impact:
+  Remote unauthorized access
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  RPC on
+  HP-UX B.10.20, B.10.26, B.11.00, B.11.04, B.11.11, B.11.22 running RPC. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00951269-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of RPC");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_28982'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_28982'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_28480'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.26")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_30063'], rls:"HPUX10.26"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_30168'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_30168'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_30407'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-SHLIBS", revision:"libc.1", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_28983'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_28983'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_28481'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00253.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00253.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00253.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,154 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for sendmail HPSBUX00253
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835129);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00253");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for sendmail HPSBUX00253");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX sendmail, 
+  where the vulnerability may be exploited remotely to gain unauthorized 
+  access or create a denial of service (DoS). 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  sendmail on
+  HP-UX B.10.10, B.10.20, B.11.00, B.11.04, B.11.11, and B.11.22. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958571-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of sendmail");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_28409'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28409'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.00.01.004", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29526'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_28760'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.11.01.005", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00254.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00254.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00254.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,164 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CIFS Server (Samba) HPSBUX00254
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835149);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00254");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for CIFS Server (Samba) HPSBUX00254");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  CIFS Server (Samba).This vulnerability may allow a remote unauthorized user 
+  to gain root access. 
+
+  Impact:
+  Remote unauthorized root access
+
+  Affected Software/OS:
+  CIFS Server (Samba) on
+  HP-UX B.11.00, B.11.11, B.11.22 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00956530-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CIFS Server (Samba)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.01.09.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.01.09.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.01.09.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00255.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00255.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00255.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,147 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ApacheStrong HPSBUX00255
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835078);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00255");
+  script_cve_id("CAN-2003-0131", "CAN-2003-0147");
+  script_name(english: "HP-UX Update for ApacheStrong HPSBUX00255");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  ApacheStrong, HPApache, or hpuxwsAPACHE, that may allow an information leak. 
+
+  Impact:
+  Information leak.
+
+  Affected Software/OS:
+  ApacheStrong on
+  HP-UX B.11.00, B.11.11, B.11.20, B.11.22 running the following HP-UX 
+  Apache-based Web Servers: 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00944767-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ApacheStrong");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.27.02", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.27.02", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.27.02", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.03.01", rls:"HPUX11.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"ApacheStrong", revision:"1.3.27.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.1.0.07.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00256.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00256.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00256.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX00256
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835131);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00256");
+  script_cve_id("CAN-2003-0132");
+  script_name(english: "HP-UX Update for Apache HPSBUX00256");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Apache. The vulnerability could be exploited remotely to create a Denial of 
+  Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.00, B.11.11, and B.11.22 running the hpuxwsAPACHE HP-UX 
+  Apache-based Web Server. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00944545-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.03.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.1.0.07.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00258.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00258.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00258.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,124 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for wall(1) HPSBUX00258
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835077);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00258");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for wall(1) HPSBUX00258");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  wall(1). The vulnerability could be exploited by a local user to increase 
+  privileges or to create a Denial of Service (DoS). 
+
+  Impact:
+  Local privilege increase
+  Denial of Service (DoS)
+
+  Affected Software/OS:
+  wall(1) on
+  HP-UX B.10.20, B.11.00, B.11.04, and B.11.11 running wall(1). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00955707-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of wall(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_28718'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_29085'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_28717'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_28719'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00262.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00262.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00262.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,102 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for uucp(1) and uusub(1) HPSBUX00262
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835122);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00262");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for uucp(1) and uusub(1) HPSBUX00262");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in uucp(1) and uusub(1) may allow local users to increase 
+  privilege. 
+
+  Impact:
+  Local increase in privilege
+
+  Affected Software/OS:
+  uucp(1) and uusub(1) on
+  HP-UX release B.10.20, B.11.00, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957937-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of uucp(1) and uusub(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"UUCP.UUCP", patch_list:['PHCO_29381'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UUCP.UUCP-ENG-A-MAN", patch_list:['PHCO_29381'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"UUCP.UUCP", patch_list:['PHCO_29382'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00263.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00263.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00263.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,184 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CDE HPSBUX00263
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835014);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00263");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for CDE HPSBUX00263");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP UX, running 
+  CDE libraries and programs could be remotely exploited to gain unauthorized 
+  privileged access and execute arbitrary code. 
+
+  Impact:
+  Remote unauthorized privileged access and execution of arbitrary code.
+
+  Affected Software/OS:
+  CDE on
+  HP-UX B.10.20, B.11.00, B.11.04, B.11.11, and B.11.22 running CDE. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957810-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CDE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_28682'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_28683'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDEDevKit.CDE-PRG", patch_list:['PHSS_28678'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_29214'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_29214'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_29201'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_29201'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDEDevKit.CDE-PRG", patch_list:['PHSS_29202'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_28677'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDEDevKit.CDE-PRG", patch_list:['PHSS_28679'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00264.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00264.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00264.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,111 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for on HP9000 Series 700/800 HPSBUX00264
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835125);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00264");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for on HP9000 Series 700/800 HPSBUX00264");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running on 
+  HP9000 Series 700/800 where network traffic may cause programs to fail and 
+  create a Denial of Service (DoS). 
+
+  Impact:
+  
+
+  Affected Software/OS:
+  on HP9000 Series 700/800 on
+  HP-UX B.11.00, B.11.04, B.11.11 and B.11.22 running on HP9000 Series 
+  700/800. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00905565-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of on HP9000 Series 700/800");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_28538'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_29453'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_28895'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00266.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00266.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00266.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,147 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for tftpd HPSBUX00266
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835054);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00266");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for tftpd HPSBUX00266");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  tftpd. The vulnerability could be exploited to allow remote a remote denial 
+  of service to tftpd. 
+
+  Impact:
+  Remote denial of service to tftpd.
+
+  Affected Software/OS:
+  tftpd on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22 running tftpd. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00901548-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of tftpd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_28828'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_28828'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-INC", patch_list:['PHNE_28828'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-BOOT", patch_list:['PHNE_29130'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_30589'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_30589'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-INC", patch_list:['PHNE_30589'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHNE_32449'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00267.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00267.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00267.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,387 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java Runtime Environment HPSBUX00267
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835136);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00267");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Java Runtime Environment HPSBUX00267");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in the HP-UX Java 
+  Runtime Environment (JRE) where the vulnerability may be remotely exploited 
+  to create an unauthorized access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  Java Runtime Environment on
+  Any HP-UX system running the supported HP-UX versions 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958678-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java Runtime Environment");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.08", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.08", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.08", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.0", revision:"1.4.0.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.0", revision:"1.4.0.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.0", revision:"1.4.0.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.1", revision:"1.4.1.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.1", revision:"1.4.1.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.1", revision:"1.4.1.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.08", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.08", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.08", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.0", revision:"1.4.0.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.0", revision:"1.4.0.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.0", revision:"1.4.0.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.1", revision:"1.4.1.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.1", revision:"1.4.1.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.1", revision:"1.4.1.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.08", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.08", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.08", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.0", revision:"1.4.0.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.0", revision:"1.4.0.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.0", revision:"1.4.0.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.1", revision:"1.4.1.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.1", revision:"1.4.1.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.1", revision:"1.4.1.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.08", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.08", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.08", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.0", revision:"1.4.0.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.0", revision:"1.4.0.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.0", revision:"1.4.0.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.1", revision:"1.4.1.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.1", revision:"1.4.1.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.1", revision:"1.4.1.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00268.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00268.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00268.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,315 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java VM (J2SE) and Java Plugin HPSBUX00268
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835098);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00268");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Java VM (J2SE) and Java Plugin HPSBUX00268");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in the HP-UX Java 
+  Virtual Machine (J2SE) and the Java Plugin where the vulnerability may be 
+  remotely exploited to create an unauthorized access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  Java VM (J2SE) and Java Plugin on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958693-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java VM (J2SE) and Java Plugin");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.09", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.09", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.09", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.X", revision:"1.4.0.05", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.X", revision:"1.4.0.05", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.X", revision:"1.4.0.05", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.09", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.09", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.09", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.X", revision:"1.4.0.05", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.X", revision:"1.4.0.05", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.X", revision:"1.4.0.05", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.09", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.09", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.09", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.X", revision:"1.4.0.05", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.X", revision:"1.4.0.05", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.X", revision:"1.4.0.05", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.2.X", revision:"1.2.2.15", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.2.X", revision:"1.2.2.15", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.2.X", revision:"1.2.2.15", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.3.X", revision:"1.3.1.09", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.3.X", revision:"1.3.1.09", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.3.X", revision:"1.3.1.09", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JRE 1.4.X", revision:"1.4.0.05", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK 1.4.X", revision:"1.4.0.05", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI 1.4.X", revision:"1.4.0.05", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00271.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00271.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00271.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,268 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX00271
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835090);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00271");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX00271");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in HP-UX Streams code may allow remote attackers to execute 
+  arbitrary code with the privileges of the user running named, typically root 
+  or to create a Denial of Service (DoS). 
+
+  Impact:
+  Execution of arbitrary code
+  denial of service (DoS)
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.00, B.11.04 (VVOS), B.11.11 and B.11.22 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957907-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-64SLIB", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-MIN", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS2-KRN", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS2-KRN", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-32ALIB", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-MIN", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-64ALIB", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-64SLIB", patch_list:['PHNE_27703'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-KRN", patch_list:['PHNE_27902'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-32ALIB", patch_list:['PHNE_27902'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-MIN", patch_list:['PHNE_27902'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-64ALIB", patch_list:['PHNE_27902'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-64SLIB", patch_list:['PHNE_27902'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS2-KRN", patch_list:['PHNE_27902'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-KRN", patch_list:['PHNE_29525'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-32ALIB", patch_list:['PHNE_29525'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-MIN", patch_list:['PHNE_29525'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-64ALIB", patch_list:['PHNE_29525'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-64SLIB", patch_list:['PHNE_29525'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS2-KRN", patch_list:['PHNE_29525'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-64SLIB", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-MIN", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS2-KRN", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS2-KRN", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-32ALIB", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-MIN", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-64ALIB", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"STREAMS-64SLIB", patch_list:['PHNE_27703'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00272.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00272.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00272.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,326 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rpc.mountd HPSBUX00272
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835113);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00272");
+  script_cve_id("CAN-1999-1225");
+  script_name(english: "HP-UX Update for rpc.mountd HPSBUX00272");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A security vulnerability has been identified on HP-UX where error messages 
+  returned by rpc.mountd can potentially be used togain remote unauthorzied 
+  access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  rpc.mountd on
+  HP-UX B.11.00, B.11.11, and B.11.22. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00908660-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rpc.mountd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-KRN", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CLIENT", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-PRG", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CORE", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS-CORE", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SERVER", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CORE", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CLIENT", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-INETD", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64ALIB", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-PRG", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-KRN", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-CLIENT", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-SERVER", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-CLIENT", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-SERVER", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS2-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64ALIB", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CLIENT", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CORE", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-PRG", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SERVER", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS-CORE", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-KRN", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00274.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00274.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00274.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,121 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for OpenView DCE HPSBUX00274
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835137);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00274");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for OpenView DCE HPSBUX00274");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX OpenView 
+  DCE. The vulnerability could be exploitedremotely to create a denial of 
+  service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  OpenView DCE on
+  HP-UX B.11.00 and B.11.11 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912026-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of OpenView DCE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OVOPC-CLT.OVOPC-SOL-CLT", patch_list:['PHSS_29645'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVOPC-CLT.OVOPC-SOL-CLT", patch_list:['PHSS_29646'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVOPC-CLT.OVOPC-LIN-CLT", patch_list:['PHSS_29626'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVOPC-CLT-ENG.OVOPC-LIN-CLT", patch_list:['PHSS_29644'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OVOPC-CLT.OVOPC-SOL-CLT", patch_list:['PHSS_29645'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OVOPC-CLT.OVOPC-LIN-CLT", patch_list:['PHSS_29626'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00275.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00275.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00275.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,124 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Shells HPSBUX00275
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835000);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00275");
+  script_cve_id("CAN-2000-1134");
+  script_name(english: "HP-UX Update for Shells HPSBUX00275");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX shells, 
+  where the vulnerability may be exploited by local users to increase 
+  privilege or create a Denial of Service (DoS). 
+
+  Impact:
+  Potential local increase of privilege
+  denial of service (DoS).
+
+  Affected Software/OS:
+  Shells on
+  HP-UX B.10.20, B.11.00, B.11.04, and B.11.11 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958494-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Shells");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_27344'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_29814'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_27804'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_27345', 'PHCO_27019', 'PHCO_26561'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00276.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00276.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00276.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for DCE HPSBUX00276
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835091);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00276");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for DCE HPSBUX00276");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  DCE, where the vulnerability may be exploited remotely to create a Denial of 
+  Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  DCE on
+  HP-UX B.11.11 running DCE 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00958403-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of DCE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_29964'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00280.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00280.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00280.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,334 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java VM (J2SE) or Java Secure Socket Extension (JSSE) Software HPSBUX00280
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835068);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00280");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Java VM (J2SE) or Java Secure Socket Extension (JSSE) Software HPSBUX00280");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  Java VM (J2SE) andJava Secure Socket Extension (JSSE) software, that may 
+  resultin arbitrary code execution and an information leak. 
+
+  Impact:
+  Arbitrary code execution.
+
+  Affected Software/OS:
+  Java VM (J2SE) or Java Secure Socket Extension (JSSE) Software on
+  HP-UX B.11.00, B.11.11, B.11.22 and B.11.23 running Java VM (J2SE) and 
+  HP9000 Servers running HP-UX release B.11.00 and B.11.11, with the following 
+  versions of 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00954663-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java VM (J2SE) or Java Secure Socket Extension (JSSE) Software");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"are listed in this bulletin.", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"for Servicecontrol Manager", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"are listed in this bulletin.", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"for Servicecontrol Manager", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"are listed in this bulletin.", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"for Servicecontrol Manager", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"are listed in this bulletin.", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"for Servicecontrol Manager", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"are listed in this bulletin.", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"for Servicecontrol Manager", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00281.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00281.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00281.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,161 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for sendmail HPSBUX00281
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835117);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00281");
+  script_cve_id("CAN-2003-0681");
+  script_name(english: "HP-UX Update for sendmail HPSBUX00281");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has beenidentified with HP-UX running 
+  sendmail, where the vulnerability could beexploited remotely to gain 
+  unauthorized privileged access. 
+
+  Impact:
+  Remote unauthorized privileged access.
+
+  Affected Software/OS:
+  sendmail on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22, B.11.23 running sendmail 8.9.3 and 
+  8.11.1. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035741-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of sendmail");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.00.01.005", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_29912'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29912'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_30224'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INET-ENG-A-MAN", patch_list:['PHNE_30224'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.11.01.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_35485'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00282.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00282.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00282.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,124 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for T1471AA Secure Shell HPSBUX00282
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835030);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00282");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for T1471AA Secure Shell HPSBUX00282");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  T1471AA Secure Shell. The vulnerability could be exploited to allow remote 
+  privilege increase and arbitrary code execution. 
+
+  Impact:
+  Remote privilege increase
+  arbitrary code execution
+
+  Affected Software/OS:
+  T1471AA Secure Shell on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running T1471AA Secure Shell. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00910818-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of T1471AA Secure Shell");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.03.61.002", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.03.61.002", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.03.61.002", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.03.61.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00286.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00286.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00286.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for AAA Server HPSBUX00286
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835123);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00286");
+  script_cve_id("CAN-2003-0543", "CAN-2003-0544", "CAN-2003-0545");
+  script_name(english: "HP-UX Update for AAA Server HPSBUX00286");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX AAA 
+  Server. The vulnerability could be exploitedremotely to create a denial of 
+  service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  AAA Server on
+  HP-UX B.11.00 and B.11.11 running HP-UX AAA Server (T1428AA) 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912021-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of AAA Server");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"AAAServer", revision:"A.06.01.02.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"AAAServer", revision:"A.06.01.02.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00287.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00287.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00287.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for on HP 9000 Servers Running MySQL HPSBUX00287
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835096);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00287");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for on HP 9000 Servers Running MySQL HPSBUX00287");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX on HP 9000 
+  Servers running MySQL with Servicecontrol Manager (SCM) 3.0. This 
+  vulnerability may allow unauthorized access, increased privileges or 
+  execution of arbitrary code. 
+
+  Impact:
+  Unauthorized access
+  increased privileges or execution of arbitrary code.
+
+  Affected Software/OS:
+  on HP 9000 Servers Running MySQL on
+  HP-UX B.11.00, B.11.11 on HP 9000 Servers running MySQL 3.23.39 with 
+  Servicecontrol Manager (SCM) 3.0. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00911995-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of on HP 9000 Servers Running MySQL");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"mysql.MYSQL", revision:"3.23.54", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"mysql.MYSQL", revision:"3.23.54", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00288.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00288.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00288.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,111 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP WEBM Services HPSBUX00288
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835108);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00288");
+  script_cve_id("CAN-2003-0543", "CAN-2003-0544", "CAN-2003-0545");
+  script_name(english: "HP-UX Update for HP WEBM Services HPSBUX00288");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with HP-HX running 
+  HP WEBM Services. The vulnerabilities could be exploited remotely to create 
+  a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  HP WEBM Services on
+  HP-UX B.11.00 running HP WEBM versions prior to A.01.05.07 HP-UX B.11.11 and 
+  B.11.23 running HP WEBM versions prior to A.02.00.02 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00891831-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP WEBM Services");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"WBEMServices.WBEM-CORE", revision:"A.01.05.07", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"WBEMServices.WBEM-CORE", revision:"A.02.00.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"WBEMServices.WBEM-CORE", revision:"A.02.00.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00289.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00289.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00289.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for dtprintinfo HPSBUX00289
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835138);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00289");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for dtprintinfo HPSBUX00289");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX 
+  dtprintinfo. The vulnerability could be exploitedlocally to gain increased 
+  privilege. 
+
+  Impact:
+  Local increased privilege.
+
+  Affected Software/OS:
+  dtprintinfo on
+  HP-UX B.11.00, B.11.11, and B.11.22. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912024-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of dtprintinfo");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11R6-SHLIBS", patch_list:['PHSS_29367'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11R6-SHLIBS", patch_list:['PHSS_29373'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11R6-SHLIBS", patch_list:['PHSS_29371'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00290.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00290.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00290.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,132 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND v920 HPSBUX00290
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835007);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00290");
+  script_cve_id("CAN-2003-0543", "CAN-2003-0544", "CAN-2003-0545");
+  script_name(english: "HP-UX Update for BIND v920 HPSBUX00290");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  1. Certain ASN.1 encodings that are rejected as invalidby the parser can 
+  trigger a bug in the deallocationof the corresponding data structure, 
+  corrupting thestack. This can be used as a denial of serviceattack. It is 
+  currently unknown whether this can beexploited to run malicious code. This 
+  issue does notaffect OpenSSL 0.9.6.<br2. Unusual ASN.1 tag values can cause 
+  an out of boundsread under certain circumstances, resulting in adenial of 
+  service vulnerability.<br3. A malformed public key in a certificate will 
+  crashthe verify code if it is set to ignore public keydecoding errors. 
+  Exploitation of an affectedapplication would result in a denial of 
+  servicevulnerability.<br4. Due to an error in the SSL/TLS protocol 
+  handling,a server will parse a client certificate when one isnot 
+  specifically requested. 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  BIND v920 on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23, running BINDv920. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00901847-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of BIND v920");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.00.01.003", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_29859'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.11.01.005", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_31726'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00292.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00292.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00292.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,200 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for SCM3.0 HPSBUX00292
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835026);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00292");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for SCM3.0 HPSBUX00292");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  SCM3.0. The vulnerability could be exploitedby configured local users to 
+  gain unauthorized access. 
+
+  Impact:
+  Local unauthorized access.
+
+  Affected Software/OS:
+  SCM3.0 on
+  HP-UX B.11.00 and B.11.11 and B.11.23 running SCM3.0. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912022-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of SCM3.0");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-AGENT", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtAgent.MX-ENG-MAN", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-CMS", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-PORTAL", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-REPO", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SysMgmtServer.MX-TOOLS", revision:"B.03.00.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00293.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00293.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00293.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,130 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Software Distributor (SD) HPSBUX00293
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835140);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00293");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Software Distributor (SD) HPSBUX00293");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  Software Distributor (SD), where the SD utilities (swinstall(1M), 
+  swverify(1M) and others)may have a locally exploitable buffer overflow that 
+  could allow increased privileges. 
+
+  Impact:
+  Local increased privileges.
+
+  Affected Software/OS:
+  Software Distributor (SD) on
+  HP9000 Servers running HP-UX B.11.00, B.11.04 (VVOS) and HP-UX B.11.11 all 
+  running Software Distributor (SD). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00909785-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Software Distributor (SD)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-CMDS", patch_list:['PHCO_28847'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-AGENT", patch_list:['PHCO_28847'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-CMDS", patch_list:['PHCO_30006'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-AGENT", patch_list:['PHCO_30006'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-CMDS", patch_list:['PHCO_28848'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-AGENT", patch_list:['PHCO_28848'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00294.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00294.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00294.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,292 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for NLSPath HPSBUX00294
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835058);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00294");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for NLSPath HPSBUX00294");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX where 
+  superuser cannot restrict the paths set in the NLSPATHenvironment variable 
+  for setuid root programs whichare using catopen(3C) and executed by others. 
+
+  Impact:
+  Increase in privilege.
+
+  Affected Software/OS:
+  NLSPath on
+  HP-UX B.10.20, B.11.00, B.11.04, B.11.11, and B.11.22. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00908653-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of NLSPath");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_29284'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN-64ALIB", patch_list:['PHCO_29284'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-64SLIB", patch_list:['PHCO_29284'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_29284'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_29284'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AX-64ALIB", patch_list:['PHCO_29284'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_29284'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_29329'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN-64ALIB", patch_list:['PHCO_29329'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-64SLIB", patch_list:['PHCO_29329'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-SHLIBS", patch_list:['PHCO_29329'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG2-AUX", patch_list:['PHCO_29329'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_30191'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN-64ALIB", patch_list:['PHCO_30191'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-64SLIB", patch_list:['PHCO_30191'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_30191'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_30191'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AX-64ALIB", patch_list:['PHCO_30191'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_30191'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX10.20")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_26158'], rls:"HPUX10.20"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN-64ALIB", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-64SLIB", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AX-64ALIB", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.SYS-ADMIN", patch_list:['PHCO_29495'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00295.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00295.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00295.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,2478 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java VM Classloader (J2SE) HPSBUX00295
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835056);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00295");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Java VM Classloader (J2SE) HPSBUX00295");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability in the Java Runtime Environment (JRE) classloader can allow 
+  an untrusted applet to escalate privileges including reading and writing 
+  files and executing arbitrary code on client systems. 
+
+  Impact:
+  Remote increase of privileges
+  unauthorized access
+  arbitrary code execution.
+
+  Affected Software/OS:
+  Java VM Classloader (J2SE) on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22, B.11.23 running Java 1.2.X, 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00901838-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java VM Classloader (J2SE)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1-1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1_1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Jre1-1.JAVA-JRE", revision:"1.2.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-1.JAVA-PLUGIN", revision:"1.2.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-2.JAVA2-PLUGIN", revision:"1.2.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1-1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1_1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-DEMO", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JDK-BASE", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JPD-BASE", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JDK", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JPD", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_base.JAVA2-JRE-BASE", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_doc.JAVA2-JRE-DOC", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_perf.JAVA2-JRE", revision:"1.2.1.16", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.11", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.1.04", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1-1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1_1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Jre1-1.JAVA-JRE", revision:"1.2.", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-1.JAVA-PLUGIN", revision:"1.2.", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-2.JAVA2-PLUGIN", revision:"1.2.", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1-1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1_1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-DEMO", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JDK-BASE", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JPD-BASE", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JDK", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JPD", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_base.JAVA2-JRE-BASE", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_doc.JAVA2-JRE-DOC", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_perf.JAVA2-JRE", revision:"1.2.1.16", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.11", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.1.04", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1-1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1_1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Jre1-1.JAVA-JRE", revision:"1.2.", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-1.JAVA-PLUGIN", revision:"1.2.", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-2.JAVA2-PLUGIN", revision:"1.2.", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1-1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1_1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-DEMO", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JDK-BASE", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JPD-BASE", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JDK", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JPD", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_base.JAVA2-JRE-BASE", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_doc.JAVA2-JRE-DOC", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_perf.JAVA2-JRE", revision:"1.2.1.16", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.11", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.1.04", rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1-1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1_1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Jre1-1.JAVA-JRE", revision:"1.2.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-1.JAVA-PLUGIN", revision:"1.2.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-2.JAVA2-PLUGIN", revision:"1.2.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1-1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1_1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-DEMO", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JDK-BASE", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JPD-BASE", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JDK", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JPD", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_base.JAVA2-JRE-BASE", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_doc.JAVA2-JRE-DOC", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_perf.JAVA2-JRE", revision:"1.2.1.16", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.1.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1-1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Dev-Kit1_1.JAVA-JDK", revision:"1.2.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Jre1-1.JAVA-JRE", revision:"1.2.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-1.JAVA-PLUGIN", revision:"1.2.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-PlugIn1-2.JAVA2-PLUGIN", revision:"1.2.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1-1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java-Runtime1_1.JAVA-RUN", revision:"1.2.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-DEMO", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JDK-BASE", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_base.JAVA2-JPD-BASE", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JDK", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2JDK_perf.JAVA2-JPD", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_base.JAVA2-JRE-BASE", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_doc.JAVA2-JRE-DOC", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2RTE_perf.JAVA2-JRE", revision:"1.2.1.16", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.1.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00296.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00296.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00296.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Partition Manager parmgr (1M) HPSBUX00296
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835066);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00296");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Partition Manager parmgr (1M) HPSBUX00296");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  Partition Manager parmgr (1M), where unauthorized remote users may gain 
+  unauthorized access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  Partition Manager parmgr (1M) on
+  HP-UX B.11.23 running Partition Manager parmgr(1M). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00911276-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Partition Manager parmgr (1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"PartitionManager.PARMGR-RUN", revision:"B.11.23.02.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PartitionManager.PARMGR-HELP", revision:"B.11.23.02.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PartitionManager.PARMGR-MAN", revision:"B.11.23.02.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00297.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00297.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00297.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,136 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CDE HPSBUX00297
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835061);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00297");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for CDE HPSBUX00297");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  CDE. The vulnerability could be exploited to allow local elevation of 
+  privilege and Denial of Service (DoS). 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  CDE on
+  HP-UX B.11.00, B.1104(VVOS),B.11.11, B.11.22, B.11.23 running CDE. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00907675-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CDE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_30010'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_30012'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_30011'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_30013'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00299.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00299.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00299.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,195 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for DCE HPSBUX00299
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835150);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00299");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for DCE HPSBUX00299");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  DCE. The vulnerability could be exploited to allow remote Denial of Service 
+  (DoS) in DCE. 
+
+  Impact:
+  Remote denial of service (DoS)
+
+  Affected Software/OS:
+  DCE on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.23, running DCE. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00906162-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of DCE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_29963'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-DTS", patch_list:['PHSS_29963'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-RUN", patch_list:['PHSS_29963'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_29966'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-COR-64SLIB", patch_list:['PHSS_29966'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-IA64-SHLIB", patch_list:['PHSS_29966'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_30771'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-COR-64SLIB", patch_list:['PHSS_30771'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-IA64-SHLIB", patch_list:['PHSS_30771'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_30302'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-DTS", patch_list:['PHSS_30302'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-RUN", patch_list:['PHSS_30302'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_29964'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-COR-64SLIB", patch_list:['PHSS_29964'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-DTS", patch_list:['PHSS_29964'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-RUN", patch_list:['PHSS_29964'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00300.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00300.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00300.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for dtmailpr Software HPSBUX00300
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835035);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00300");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for dtmailpr Software HPSBUX00300");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  dtmailpr software, where a buffer overflowmay allow a local user to obtain 
+  root privileges. 
+
+  Impact:
+  Local root privileges.
+
+  Affected Software/OS:
+  dtmailpr Software on
+  HP-UX B.11.00, B.11.11, B.11.22 and B.11.23 running dtmailpr software. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00911011-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of dtmailpr Software");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_29734'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_29736'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_29735'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_29737'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00301.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00301.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00301.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,131 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache mod_cgid HPSBUX00301
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835103);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00301");
+  script_cve_id("CAN-2003-0789", "CAN-2003-0542");
+  script_name(english: "HP-UX Update for Apache mod_cgid HPSBUX00301");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Apache with mod_cgid, mod_alias or mod_rewrite. The vulnerability could be 
+  exploited to allow Denial of Service (DoS) or Potential Execution of 
+  Arbitrary Code. 
+
+  Impact:
+  Denial of Service (DoS) or Potential Execution of Arbitrary Code
+
+  Affected Software/OS:
+  Apache mod_cgid on
+  HP-UX B.11.00, B.11.11, B.11.20, B.11.22 and B.11.23 running the 
+  hpuxwsAPACHE HP-UX Apache-based Web Server. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912060-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache mod_cgid");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.10.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.1.0.10.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.1.0.10.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.1.0.10.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.1.0.10.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Bind 8.1.2 HPSBUX00303
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835097);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00303");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Bind 8.1.2 HPSBUX00303");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Bind 8.1.2. The vulnerability could be exploited remotely to create a Denial 
+  of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Bind 8.1.2 on
+  HP-UX B.11.00 and B.11.11 running Bind 8.1.2. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00909786-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Bind 8.1.2");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv812.INETSVCS-BIND", revision:"9.2.0", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_30068'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00304.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00304.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00304.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,122 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for shar(1) HPSBUX00304
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835019);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00304");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for shar(1) HPSBUX00304");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  shar(1). The vulnerability could be exploited to allow local execution of 
+  arbitrary code. 
+
+  Impact:
+  Local execution of arbitrary code
+
+  Affected Software/OS:
+  shar(1) on
+  HP-UX B.11.00, B.11.04, B.11.11 running shar(1). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00910986-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of shar(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"using the new procedure.", patch_list:['PHCO_28954'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CMDS-AUX", patch_list:['PHCO_28954'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"using the new procedure.", patch_list:['PHCO_29697'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CMDS-AUX", patch_list:['PHCO_29697'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CMDS-AUX", patch_list:['PHCO_29010'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00307.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00307.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00307.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,145 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for SharedX HPSBUX00307
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835036);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00307");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for SharedX HPSBUX00307");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Local users of HP-UX SharedX can potentially gain unauthorized access or 
+  create a denial of service(DoS). 
+
+  Impact:
+  Local unauthorized access or denial of service
+
+  Affected Software/OS:
+  SharedX on
+  HP-UX B.11.00, B.11.11, and B.11.22. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00908669-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of SharedX");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"WTSharedX.WTSHAREDX", patch_list:['PHSS_29338'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ImagingJp.WTIMAG-JPN-E-H", patch_list:['PHSS_29338'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WTSharedXJp.WTSX-JPN-S-H", patch_list:['PHSS_29338'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WTWhitebJp.WTWHB-JPN-S-H", patch_list:['PHSS_29338'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"WTSharedX.WTSHAREDX", patch_list:['PHSS_29550'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"WTSharedX.WTSHAREDX", patch_list:['PHSS_29338'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ImagingJp.WTIMAG-JPN-E-H", patch_list:['PHSS_29338'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WTSharedXJp.WTSX-JPN-S-H", patch_list:['PHSS_29338'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WTWhitebJp.WTWHB-JPN-S-H", patch_list:['PHSS_29338'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00308.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00308.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00308.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,254 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for libDtSvc HPSBUX00308
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835142);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00308");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for libDtSvc HPSBUX00308");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A locally exploitable buffer overflow has beenidentified in libDtSvc which 
+  can be used to gain increased privilege. 
+
+  Impact:
+  Local increase in privilege.
+
+  Affected Software/OS:
+  libDtSvc on
+  HP-UX B.11.00, B.11.04, B.11.11, and B.11.22. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00908671-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of libDtSvc");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_28675'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_28682'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_28682'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_28682'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-FONTS", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TCH-B-MSG", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ITA-I-MSG", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-ENG-A-MSG", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SCH-H-MSG", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SWE-I-MSG", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-MIN", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-TT", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-SHLIBS", patch_list:['PHSS_28676'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00309.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00309.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00309.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for dtterm HPSBUX00309
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835121);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00309");
+  script_cve_id("CVE-2003-0064");
+  script_name(english: "HP-UX Update for dtterm HPSBUX00309");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  dtterm. The vulnerability could be exploited to allow remote arbitrary 
+  command execution. 
+
+  Impact:
+  Remote arbitrary command execution
+
+  Affected Software/OS:
+  dtterm on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22 running dtterm. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00910973-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of dtterm");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_29734'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_29736'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_30167'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-DTTERM", patch_list:['PHSS_29735'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00310.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00310.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00310.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,217 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for calloc(3C) HPSBUX00310
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835110);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00310");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for calloc(3C) HPSBUX00310");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A locally exploitable buffer overflow has beenidentified in calloc(3C) which 
+  can be used to potentially create a Denial of Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS).
+
+  Affected Software/OS:
+  calloc(3C) on
+  HP-UX B.11.00, B.11.04, and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00908675-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of calloc(3C)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_28425'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN-64ALIB", patch_list:['PHCO_28425'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-64SLIB", patch_list:['PHCO_28425'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_28425'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_28425'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AX-64ALIB", patch_list:['PHCO_28425'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_28425'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_29190'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN-64ALIB", patch_list:['PHCO_29190'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-64SLIB", patch_list:['PHCO_29190'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_29190'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_29190'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AX-64ALIB", patch_list:['PHCO_29190'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_29190'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN", patch_list:['PHCO_28427'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.C-MIN-64ALIB", patch_list:['PHCO_28427'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-64SLIB", patch_list:['PHCO_28427'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_28427'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AUX", patch_list:['PHCO_28427'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-AX-64ALIB", patch_list:['PHCO_28427'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.PROG-MIN", patch_list:['PHCO_28427'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00312.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00312.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00312.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for /usr/lbin/rwrite HPSBUX00312
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835124);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "00312");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for /usr/lbin/rwrite HPSBUX00312");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A locally exploitable buffer overflow has beenidentified in /usr/lbin/rwrite 
+  which can potentially be used to cause a Denial of Service (DoS). 
+
+  Impact:
+  Local
+
+  Affected Software/OS:
+  /usr/lbin/rwrite on
+  HP-UX B.11.00 and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00908667-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of /usr/lbin/rwrite");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_29208'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"PrinterMgmt.LP-SPOOL", patch_list:['PHCO_29209'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01002.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01002.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01002.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,122 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rpc.ypupdated HPSBUX01002
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835116);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01002");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for rpc.ypupdated HPSBUX01002");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  rpc.ypupdated, that may allow a remote user unauthorized access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  rpc.ypupdated on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running rpc.ypupdated. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00908571-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rpc.ypupdated");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29785'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-SERVER", patch_list:['PHNE_30084'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29783'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-SERVER", patch_list:['PHNE_30095'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01006.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01006.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01006.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX01006
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835128);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01006");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX01006");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX directory 
+  permissions. The vulnerability could be exploited to allow local elevation 
+  of privileges. 
+
+  Impact:
+  Local elevation of privilege.
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.00, HP-UX B.11.04, HP-UX B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00912101-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_29621'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_30519'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_29622'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01011.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01011.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01011.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,111 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for AAA Server HPSBUX01011
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835158);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01011");
+  script_cve_id("CAN-2004-0079", "CAN-2004-0112", "CAN-2004-0081");
+  script_name(english: "HP-UX Update for AAA Server HPSBUX01011");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified withthe HP-UX AAA 
+  server where an unauthenticated remote attackercould cause a Denial of 
+  Service (DoS). 
+
+  Impact:
+  Remote denial of service.
+
+  Affected Software/OS:
+  AAA Server on
+  HP-UX B.11.00 and B.11.11 running HP-UX AAA Server A.06.01.02.04 HP-UX 
+  B.11.23 running HP-UX AAA Server A.06.01.02.06. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00897351-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of AAA Server");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"AAAServer", revision:"A.06.01.02.07", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"AAAServer", revision:"A.06.01.02.07", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"AAAServer", revision:"A.06.01.02.07", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01018.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01018.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01018.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,167 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for XFree86 HPSBUX01018
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835157);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01018");
+  script_cve_id("CAN-2004-0083", "CAN-2004-0084", "CAN-2004-0106");
+  script_name(english: "HP-UX Update for XFree86 HPSBUX01018");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX, where a 
+  bufferoverflow in XFree86 could be remotely exploited to gain unauthorized 
+  privileged access or execute arbitrary code. 
+
+  Impact:
+  Remote unauthorized privileged access
+  execution of arbitrary code.
+
+  Affected Software/OS:
+  XFree86 on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22, and B.11.23 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957781-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of XFree86");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.OEM-SERVER", patch_list:['PHSS_30172'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"X11.MKFONTDIR", patch_list:['PHSS_30479'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.OEM-SERVER", patch_list:['PHSS_30171'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"X11.MKFONTDIR", patch_list:['PHSS_30480'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.X11-SERV", patch_list:['PHSS_30586'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"X11.MKFONTDIR", patch_list:['PHSS_30706'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.X11-SERV", patch_list:['PHSS_30181'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"X11.MKFONTDIR", patch_list:['PHSS_30477'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.X11-SERV", patch_list:['PHSS_30173'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"X11.MKFONTDIR", patch_list:['PHSS_30478'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01019.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01019.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01019.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,209 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX01019
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835044);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01019");
+  script_cve_id("CAN-2003-0079", "CAN-2004-0112");
+  script_name(english: "HP-UX Update for Apache HPSBUX01019");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with HP-UX running 
+  Apache. These vulnerabilities could be exploited remotely to create a Denial 
+  of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running the hpuxwsAPACHE HP-UX 
+  Apache-based Web Server. HP-UX B.11.04. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00944046-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.49.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.11.23", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS", patch_list:['PHSS_30639'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-OPENSSH", patch_list:['PHSS_30640'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_30641'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTGP.TGP-CORE", patch_list:['PHSS_30642'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS", patch_list:['PHSS_30643'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-OPENSSH", patch_list:['PHSS_30644'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_30645'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTGP.TGP-CORE", patch_list:['PHSS_30646'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultTS.VV-IWS", patch_list:['PHSS_30647'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_30648'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HP_Webproxy.HPWEB-PX-CORE", patch_list:['PHSS_30649'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"HP_Webproxy.HPWEB-PX-CORE", patch_list:['PHSS_30650'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.49.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.49.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.49.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01020.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01020.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01020.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,388 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for RPC HPSBUX01020
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835039);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01020");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for RPC HPSBUX01020");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  RPC. The vulnerability could be exploited to allow remote Denial of Service 
+  (DoS). 
+
+  Impact:
+  Remote denial of Service (DoS)
+
+  Affected Software/OS:
+  RPC on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running RPC. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00951288-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of RPC");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-PRG", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-KRN", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-CLIENT", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-SERVER", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-CLIENT", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-SERVER", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS2-CORE", patch_list:['PHNE_29449'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_30090'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-CLIENT", patch_list:['PHNE_30091'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-SERVER", patch_list:['PHNE_30091'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS2-CORE", patch_list:['PHNE_30091'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_30092'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-CORE", patch_list:['PHNE_30092'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-SERVER", patch_list:['PHNE_30092'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-CORE", patch_list:['PHNE_30093'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS2-SERVER", patch_list:['PHNE_30094'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CLIENT", patch_list:['PHNE_30808'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_30808'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_30808'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-KRN", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CLIENT", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-PRG", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS-CORE", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SERVER", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CORE", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CLIENT", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-INETD", patch_list:['PHNE_29210'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CLIENT", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CORE", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-PRG", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SERVER", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CLIENT", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CORE", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS-CORE", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-KRN", patch_list:['PHNE_29211'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01022.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01022.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01022.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX01022
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835023);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01022");
+  script_cve_id("CAN-2003-0020", "CAN-2004-0113", "CAN-2004-0174");
+  script_name(english: "HP-UX Update for Apache HPSBUX01022");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Apache. The vulnerability could be exploited remotely to allow execution of 
+  arbitrary code or to create a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running the hpuxwsAPACHE HP-UX 
+  Apache-based Web Server. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00943911-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.49.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.49.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.49.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.49.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01038.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01038.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,138 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CDE dtlogin HPSBUX01038
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835071);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01038");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for CDE dtlogin HPSBUX01038");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  CDE dtlogin software, where the potential vulnerability may be exploited 
+  locally or remotely to allow unauthorized privileged access or a Denial of 
+  Service (DoS). 
+
+  Impact:
+  Remote unauthorized privileged access
+  denial of service (DoS)
+
+  Affected Software/OS:
+  CDE dtlogin on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22, and B.11.23 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957752-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CDE dtlogin");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_30670'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_30671'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_30807'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_30668'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CDE.CDE-RUN", patch_list:['PHSS_30669'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01044.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01044.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01044.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,171 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java Runtime Environment (JRE) HPSBUX01044
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835050);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01044");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Java Runtime Environment (JRE) HPSBUX01044");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified with HP-UX Java Runtime 
+  Environment (JRE) where an unprivileged remote attacker may be able to 
+  create a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Java Runtime Environment (JRE) on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00957662-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java Runtime Environment (JRE)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE14", revision:"1.4.2.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK14", revision:"1.4.2.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI14", revision:"1.4.2.03.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE14", revision:"1.4.2.03.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK14", revision:"1.4.2.03.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI14", revision:"1.4.2.03.01", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE14", revision:"1.4.2.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK14", revision:"1.4.2.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI14", revision:"1.4.2.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"JRE14", revision:"1.4.2.03.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JDK14", revision:"1.4.2.03.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JPI14", revision:"1.4.2.03.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01050.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01050.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01050.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,135 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ftp HPSBUX01050
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835092);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01050");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ftp HPSBUX01050");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ftp. The vulnerability could be exploited to allow remote unauthorized 
+  access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  ftp on
+  HP-UX B.11.00,B.11.04, B.11.11, B.11.22 running ftp. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00951289-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ftp");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_29462'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29460'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.00.01.003", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_31034'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29461'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.11.01.003", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01054.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01054.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01054.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,182 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ARPA Transport HPSBUX01054
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835154);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01054");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ARPA Transport HPSBUX01054");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ARPA Transport. The vulnerability could be exploited to allow local Denial 
+  of Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  ARPA Transport on
+  HP-UX B.11.00, B.11.04, B.11.11 running ARPA Transport. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00965459-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ARPA Transport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_29473'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN", patch_list:['PHNE_29473'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_29473'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NMS2-KRN", patch_list:['PHNE_29473'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_29473'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_30905'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN", patch_list:['PHNE_30905'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_30905'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NMS2-KRN", patch_list:['PHNE_30905'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_30905'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_29887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN", patch_list:['PHNE_29887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_29887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NMS2-KRN", patch_list:['PHNE_29887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_29887'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01061.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01061.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01061.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for xfs and stmkfont HPSBUX01061
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835133);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01061");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for xfs and stmkfont HPSBUX01061");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with HP-UX running 
+  xfs and stmkfont. These vulnerabilities can be exploited to allow remote 
+  unauthorized access to resources owned by group 'bin.' 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  xfs and stmkfont on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running xfs and stmkfont. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00924426-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of xfs and stmkfont");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31180'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31181'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31178'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31179'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01062.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01062.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,111 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for the CIFS Server HPSBUX01062
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835144);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01062");
+  script_cve_id("CAN-2004-0686", "CAN-2004-0600");
+  script_name(english: "HP-UX Update for the CIFS Server HPSBUX01062");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running the 
+  CIFS Server where a buffer overflow may allow a remote user to gain root 
+  access. 
+
+  Impact:
+  Remote root access.
+
+  Affected Software/OS:
+  the CIFS Server on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running the CIFS Server version 
+  A.01.11.01 and previous. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00916390-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of the CIFS Server");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server", revision:"A.01.11.02", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server", revision:"A.01.11.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server", revision:"A.01.11.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01064.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01064.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01064.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,118 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX01064
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835148);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01064");
+  script_cve_id("CAN-2004-0493", "CAN-2004-0488", "CAN-2004-0594", "CAN-2004-0595");
+  script_name(english: "HP-UX Update for Apache HPSBUX01064");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Apache. The vulnerability could be exploited remotely to allow execution of 
+  arbitrary code or to create a Denial of Service (DoS). 
+
+  Impact:
+  Remote execution of arbitrary code
+  Denial of Service (DoS)
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running the hpuxwsAPACHE HP-UX 
+  Apache-based Web Server. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00915716-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.50.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.50.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.50.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.50.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01065.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01065.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01065.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,168 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Process Resource Manager (PRM) HPSBUX01065
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835072);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01065");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Process Resource Manager (PRM) HPSBUX01065");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX Process 
+  Resource manager (PRM), HP-UX Workload Manager (WLM) uses PRM to control 
+  resources, so the vulnerability also exists for this software. This 
+  vulnerability could be exploited by a local user to cause data file 
+  corruption. 
+
+  Impact:
+  Local data file corruption.
+
+  Affected Software/OS:
+  Process Resource Manager (PRM) on
+  HP-UX B.11.00, B.11.11, B.11.23 running Process Resource Manager (PRM) 
+  C.02.01 (.01) and prior versions and Workload Manager (WLM) A.02.01 and 
+  prior versions. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00915992-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Process Resource Manager (PRM)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Proc-Resrc-Mgr.PRM-RUN", revision:"C.02.02", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PRM-Sw-Lib.PRM-LIB", revision:"C.02.02", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WLM-Monitor", revision:"A.02.02", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Workload-Mgr", revision:"A.02.02", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Proc-Resrc-Mgr.PRM-RUN", revision:"C.02.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PRM-Sw-Lib.PRM-LIB", revision:"C.02.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WLM-Monitor", revision:"A.02.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Workload-Mgr", revision:"A.02.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Proc-Resrc-Mgr.PRM-RUN", revision:"C.02.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"PRM-Sw-Lib.PRM-LIB", revision:"C.02.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WLM-Monitor", revision:"A.02.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Workload-Mgr", revision:"A.02.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01070.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01070.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01070.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,129 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Netscape NSS Library Suite SSLv2 HPSBUX01070
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835006);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01070");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Netscape NSS Library Suite SSLv2 HPSBUX01070");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Netscape NSS library suite SSLv2. The vulnerability could be exploited to 
+  allow remote execution of arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  Netscape NSS Library Suite SSLv2 on
+  HP-UX B.11.00, B.11.11, B.11.23 running Netscape Directory Server (NDS) or 
+  Netscape Administration Server (AS). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00914405-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Netscape NSS Library Suite SSLv2");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"NscapeDir40SrvUS.DirectoryServer", revision:"6.11.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NscapeDir40SrvUS.AdminServer", revision:"6.11.", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"NscapeDir40SrvUS.DirectoryServer", revision:"6.11.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NscapeDir40SrvUS.AdminServer", revision:"6.11.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NscapeDir40SrvUS.DirectoryServer", revision:"6.11.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NscapeDir40SrvUS.AdminServer", revision:"6.11.", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01086.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01086.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01086.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CIFS Samba Server HPSBUX01086
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835081);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01086");
+  script_cve_id("CAN-2004-0815");
+  script_name(english: "HP-UX Update for CIFS Samba Server HPSBUX01086");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UXrunning the 
+  CIFS Server (Samba). This vulnerability couldotentially be exploited 
+  remotely to gain file access. 
+
+  Impact:
+  Remote file access
+
+  Affected Software/OS:
+  CIFS Samba Server on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running HP-UX CIFS (Samba). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00901842-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CIFS Samba Server");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server", revision:"A.01.11.03", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server", revision:"A.01.11.03", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server", revision:"A.01.11.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server", revision:"A.01.11.03", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01088.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01088.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01088.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,136 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX01088
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835153);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01088");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX01088");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  stmkfont. The vulnerability could be exploited to allow local unauthorized 
+  privileged access. 
+
+  Impact:
+  Remote unauthorized priveleged access
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running stmkfont. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00901390-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31989'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31990'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_32196'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31987'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_31988'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01090.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01090.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01090.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,119 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache with PHP HPSBUX01090
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835139);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01090");
+  script_cve_id("CAN-2004-0747", "CAN-2004-0748", "CAN-2004-0751", "CAN-2004-0786", "CAN-2004-0809", "CAN-2004-0811");
+  script_name(english: "HP-UX Update for Apache with PHP HPSBUX01090");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Several potential security vulnerabilities have been identified inApache Web 
+  Server and PHP running on HP-UX where a remoteuser may be able to cause a 
+  Denial of Service (DoS), obtainlocal elevation of privileges or gain 
+  unauthorized access torestricted resources.<br 
+
+  Impact:
+  Remote denial of service
+  local increase in privilege
+
+  Affected Software/OS:
+  Apache with PHP on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running the currently supported 
+  versions of hpuxwsAPACHE HP-UX 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00901851-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache with PHP");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.52.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.52.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.52.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.52.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01100.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01100.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01100.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,1616 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java Plug-In (JPI) HPSBUX01100
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835085);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01100");
+  script_cve_id("CAN-2004-1029");
+  script_name(english: "HP-UX Update for Java Plug-In (JPI) HPSBUX01100");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with HP-UX running 
+  Java Plug-In (JPI). These vulnerabilities could be exploited remotely to 
+  allow elevation of privilege, Denial of Service (DoS), or unauthorized 
+  access to files and web pages. 
+
+  Impact:
+  Remote elevation of privilege
+  Denial of Service (DoS)
+  unauthorized access to files and web pages.
+
+  Affected Software/OS:
+  Java Plug-In (JPI) on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running Java Plug-In (JPI) revision 
+  1.3.1 prior to revision 1.3.1.14.00 HP-UX B.11.00, B.11.11, B.11.22, B.11.23 
+  running Java Plug-In (JPI) revision 1.4.2 prior to revision 1.4.2.06.00. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00899041-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java Plug-In (JPI)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.06.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.06.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.06.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-COM", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk.JDK-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre.JRE-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-COM", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk13.JDK13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-CL", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-IPF32-HS", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-CL", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA11-HS", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-CL", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre13.JRE13-PA20-HS", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-DEMO", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_base.JAVA2-JDK-BASE", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-JDK13_perf.JAVA2-JDK", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-PlugIn13.JAVA2-PLUGIN", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_base.JAVA2-JRE-BASE", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_doc.JAVA2-JRE-DOC", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Java2-RTE13_perf.JAVA2-JRE", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-COM-DOC", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-IPF32", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi13.JPI13-PA11", revision:"1.3.1.14.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.06.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01102.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01102.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01102.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for newgrp(1) HPSBUX01102
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835004);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01102");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for newgrp(1) HPSBUX01102");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  newgrp(1). The vulnerability could be exploited by a local authorized user 
+  to elevaterivileges. 
+
+  Impact:
+  Local elevation of privilege
+
+  Affected Software/OS:
+  newgrp(1) on
+  HP-UX B.11.00, B.11.04, B.11.11 running newgrp(1). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00898954-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of newgrp(1)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CMDS-AUX", patch_list:['PHCO_29682'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_32280'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CMDS-AUX", patch_list:['PHCO_26385'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,185 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for System Administration Manager (SAM) HPSBUX01104
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835015);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01104");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for System Administration Manager (SAM) HPSBUX01104");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identifiedwith HP-UX running 
+  System Administration Manager (SAM) that may allow a local user elevation of 
+  privilege. 
+
+  Impact:
+  
+
+  Affected Software/OS:
+  System Administration Manager (SAM) on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22, and B.11.23 running System 
+  Administration Manager (SAM). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00896487-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of System Administration Manager (SAM)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHCO_28125'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_28125'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.OBAM-RUN", patch_list:['PHCO_28125'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.SAM", patch_list:['PHCO_28125'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.OBAM-RUN", patch_list:['PHSS_31243'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.OBAM-RUN-IA", patch_list:['PHSS_31243'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHCO_32549'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_32549'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.OBAM-RUN", patch_list:['PHCO_32549'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.SAM", patch_list:['PHCO_32549'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.OBAM-RUN", patch_list:['PHSS_31240'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.OBAM-RUN", patch_list:['PHSS_31817'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.OBAM-RUN-IA", patch_list:['PHSS_31817'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01105.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01105.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01105.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,116 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Netscape Directory Server Using LDAP HPSBUX01105
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835049);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01105");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Netscape Directory Server Using LDAP HPSBUX01105");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified onHP-UX running 
+  Netscape Directory Server (NDS) usingLDAP which could be exploited 
+  remotelyto execute arbitrary code or create a Denial of Service. 
+
+  Impact:
+  Remote arbitrary
+
+  Affected Software/OS:
+  Netscape Directory Server Using LDAP on
+  HP-UX B.11.00, B.11.11, B.11.23 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00897412-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Netscape Directory Server Using LDAP");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLAPD", revision:"B.06.11.30", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLAPD", revision:"B.06.11.30", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLAPD", revision:"B.06.11.30", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLAPD", revision:"B.06.21.10", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01117.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01117.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01117.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND v9.2.0 HPSBUX01117
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835008);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01117");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for BIND v9.2.0 HPSBUX01117");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified with HP-UX running BIND9.2.0 
+  which could be exploited by a remote, unauthorized user tocreate a Denial of 
+  Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  BIND v9.2.0 on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running BIND 9.2.0. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00897401-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of BIND v9.2.0");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.00.01.004", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_32783'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.11.01.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_32443'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01118.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01118.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01118.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,136 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ftpd HPSBUX01118
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835073);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01118");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ftpd HPSBUX01118");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has beenidentified with HP UX running 
+  ftpd, where a bufferoverflow in ftpd could be remotely exploited toallow an 
+  unauthorized user to gain privileged access. 
+
+  Impact:
+  Remote privileged access.
+
+  Affected Software/OS:
+  ftpd on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22 running ftpd HP-UX B.11.00, B.11.11 
+  wu-ftp version 2.6 running ftpd 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035676-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ftpd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_29462'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29460'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.00.01.003", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_31034'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29461'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.11.01.003", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01119.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01119.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01119.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,148 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ftpd HPSBUX01119
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835037);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01119");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ftpd HPSBUX01119");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified withHP-UX running ftpd where 
+  the vulnerability couldbe exploited to allow a remote authorized 
+  userunauthorized access to files. 
+
+  Impact:
+  Remote Unauthorized Access
+
+  Affected Software/OS:
+  ftpd on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.22, and B.11.23. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035678-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ftpd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_29462'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_30983'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_32813'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_30989'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.00.01.004", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_30990'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.11.01.004", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01123.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01123.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01123.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,131 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX01123
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835031);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01123");
+  script_cve_id("CAN-2004-0942", "CAN-2004-0885");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX01123");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has beenidentified with Apache running on 
+  HP-UX where the vulnerability could beexploited remotely to create a Denial 
+  of Service (DoS) or to bypassSSLCipherSuite restrictions. 
+
+  Impact:
+  Remote denial of service (DoS) or bypass of SSLCipherSuite settings.
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running the hpuxwsAPACHE HP-UX 
+  Apache-based Web Server. HP-UX B.11.04 with Virtualvault 4.7 running Apache 
+  2.x Web Server. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035700-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.53.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"VaultWS.WS-CORE", patch_list:['PHSS_33075'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.53.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.53.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.53.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01133.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01133.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01133.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,124 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Mozilla remote HPSBUX01133
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835053);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01133");
+  script_cve_id("CAN-2005-2871", "CAN-2005-0399", "CAN-2005-0401", "CAN-2005-0989", "CAN-2004-1316", "CAN-2005-2781");
+  script_name(english: "HP-UX Update for Mozilla remote HPSBUX01133");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Mozilla, where a heap overflow could be exploited to allow a remote, 
+  unauthorized user to execute privileged code. 
+
+  Impact:
+  Remote execution of privileged code
+
+  Affected Software/OS:
+  Mozilla remote on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running Mozilla versions prior to 
+  1.7.8.00. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00884708-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Mozilla remote");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.8.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.8.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.8.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.8.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01137.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01137.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01137.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,109 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for TCP/IP (IPv4) HPSBUX01137
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835033);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01137");
+  script_cve_id("CAN-2005-1192");
+  script_name(english: "HP-UX Update for TCP/IP (IPv4) HPSBUX01137");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UXrunning 
+  TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a 
+  Denial of Service(DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  TCP/IP (IPv4) on
+  HP-UX B.11.11, B.11.22, B.11.23 running TCP/IP (IPv4) 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00571568-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of TCP/IP (IPv4)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_32606'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", patch_list:['PHNE_35766'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_33159'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", patch_list:['PHNE_35351'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01165.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01165.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01165.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,130 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Trusted System HPSBUX01165
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835146);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01165");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Trusted System HPSBUX01165");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX trusted 
+  systems where the vulnerability may be exploited to allow remote 
+  unauthorized access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  Trusted System on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 which have been converted to 
+  trusted systems. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00892559-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Trusted System");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHCO_29249 and PHNE_17030'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_29249 and PHNE_17030'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-SHLIBS", patch_list:['PHCO_32926'], rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-SHLIBS", patch_list:['PHCO_33215'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-SHLIBS", patch_list:['PHCO_32926'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01214.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01214.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01214.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,350 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java Web Start HPSBUX01214
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835076);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01214");
+  script_cve_id("CAN-2004-1029", "CAN-2005-1973");
+  script_name(english: "HP-UX Update for Java Web Start HPSBUX01214");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in Java(TM) Web Start 
+  on HP-UX. The vulnerability can be exploited by a remote unauthorized user 
+  to gain privileged access. 
+
+  Impact:
+  Remote unauthorized privileged access.
+
+  Affected Software/OS:
+  Java Web Start on
+  Java Web Start on Java 5.0.0 (a.k.a. 1.5.0.0) release running on HP-UX 
+  B.11.11 and B.11.23. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00897307-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java Web Start");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-COM", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-DEMO", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF32", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF64", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20W", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PNV2", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PWV2", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM-DOC", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32-HS", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64-HS", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20-HS", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W-HS", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2-H", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2-H", revision:"1.5.0.01.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-COM", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-DEMO", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF32", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF64", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20W", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PNV2", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PWV2", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM-DOC", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32-HS", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64-HS", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20-HS", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W-HS", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2-H", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2-H", revision:"1.5.0.01.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01218.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01218.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01218.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Veritas VxFS 3.3/3.5 HPSBUX01218
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835045);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01218");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Veritas VxFS 3.3/3.5 HPSBUX01218");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified in HP-UX running theVeritas 
+  File System (VxFS) that may allow local unauthorized access to data by an 
+  authorized user. 
+
+  Impact:
+  Local unauthorized access to data by an authorized user.
+
+  Affected Software/OS:
+  Veritas VxFS 3.3/3.5 on
+  HP-UX B.11.00 running VxFS 3.3 HP-UX B.11.11 running VxFS 3.3 HP-UX B.11.11 
+  running VxFS 3.5 HP-UX B.11.23 running VxFS 3.5 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00897380-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Veritas VxFS 3.3/3.5");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"VxFS 3.3", patch_list:['PHKL_33285'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"VxFS 3.5", patch_list:['PHKL_31500'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"VRTSvxfs.VXFS-KRN", patch_list:['PHKL_29896'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"JFS.VXFS-BASE-KRN", patch_list:['PHKL_32669'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01219.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01219.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01219.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,297 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Ignite-UX HPSBUX01219
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835114);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01219");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Ignite-UX HPSBUX01219");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified withHP-UX running Ignite-UX 
+  where the vulnerability couldbe exploited to allow a remote authorized 
+  userunauthorized access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  Ignite-UX on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running Ignite-UX. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01035681-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Ignite-UX");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-KRN-11-22", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-SERVICES", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.FILESRV-1122IA", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.CFG-FILE-11-22", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.IGNITE", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.OBAM-RUN", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.RECOVERY", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-COMMON-IA", revision:"C.6.2.241", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-KRN-11-23", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-SERVICES", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.IGNITE", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.OBAM-RUN", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.RECOVERY", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.FILE-SRV-11-23", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-COMMON-PA", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-COMMON-IA", revision:"C.6.2.241", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-KRN-11-00", revision:"C.6.2.241", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-SERVICES", revision:"C.6.2.241", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.FILE-SRV-11-00", revision:"C.6.2.241", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"C.6.2.241", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.IGNITE", revision:"C.6.2.241", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.OBAM-RUN", revision:"C.6.2.241", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.RECOVERY", revision:"C.6.2.241", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"change permissions, remove files", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-KRN-11-11", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.BOOT-SERVICES", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.FILE-SRV-11-11", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.IGNITE", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.OBAM-RUN", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.RECOVERY", revision:"C.6.2.241", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01230.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01230.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01230.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,125 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX01230
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835075);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01230");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX01230");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with Mozilla 
+  versions prior to 1.7.11.00 running on HP-UX, where the vulnerabilities 
+  could be exploited to allow a remote, unauthorized user to execute 
+  privileged code. 
+
+  Impact:
+  Remote unauthorized execution of privileged code
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.00, B.11.11, B.11.22, B.11.23 running Mozilla versions prior to 
+  1.7.11.00. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00885789-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.11.00", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.22")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.11.00", rls:"HPUX11.22"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.11.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Mozilla.MOZ-COM", revision:"1.7.11.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01232.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01232.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01232.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX01232
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835101);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "01232");
+  script_cve_id("CAN-2005-2700");
+  script_name(english: "HP-UX Update for Apache HPSBUX01232");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with Apacherunning on 
+  HP-UX. The vulnerability could be exploitedremotely to bypass client-based 
+  certificate authentication andgain unauthorized access to certain web pages. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 running the hpuxwsAPACHE HP-UX 
+  Apache-based Web Server. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00896445-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.54.02", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.54.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.54.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.54.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02072.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02072.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02072.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Trusted Mode remshd HPSBUX02072
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835017);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02072");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Trusted Mode remshd HPSBUX02072");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability hs been identified with HP-UX systems running in 
+  Trusted Mode. The vulnerability could be exploited remotely to gain 
+  unauthorized access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  Trusted Mode remshd on
+  HP-UX B.11.00, B.11.11, and B.11.23. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00543854-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Trusted Mode remshd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_33790'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_33792'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_33791'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02073.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for envd HPSBUX02073
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835093);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02073");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for envd HPSBUX02073");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified with HP-UX running the 
+  envd(1M). The vulnerability could be exploited by a local authorized user to 
+  execute arbitrary code and/or gain unauthorized privileges. 
+
+  Impact:
+  Local execution of privileged code.
+
+  Affected Software/OS:
+  envd on
+  HP-UX B.11.00 and B.11.11. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00547561-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of envd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_33989'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_33967'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02076.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02076.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02076.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,116 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for IPSec HPSBUX02076
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835109);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02076");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for IPSec HPSBUX02076");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential vulnerabilities have been identified with HP-UX running 
+  IPSec.<brThese vulnerabilities may be exploited remotely by an unauthorized 
+  user<brto create a Denial of Service (DoS). 
+
+  Impact:
+  
+
+  Affected Software/OS:
+  IPSec on
+  HP-UX B.11.00, B.11.11, and B.11.23 running IPSec. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00555601-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of IPSec");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", revision:"A.01.05.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", revision:"A.02.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", revision:"A.01.07.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", revision:"A.02.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02082.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02082.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02082.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for IPSec HPSBUX02082
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835002);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02082");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for IPSec HPSBUX02082");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been discovered with HP-UX 
+  running<brIPSec. The vulnerability could be exploited to allow remote 
+  unauthorized access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  IPSec on
+  HP-UX B.11.00, B.11.11, and B.11.23 running IPSec. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00574124-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of IPSec");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", revision:"A.01.05.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", revision:"A.02.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPSec.IPSEC2-KRN", revision:"A.01.07.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02087.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02087.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02087.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX02087
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835118);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02087");
+  script_cve_id("CVE-2004-0744");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX02087");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerabilityhas been identified with HP-UX running 
+  TCP/IP.<brThe potential vulnerability could be exploited remotely to cause a 
+  Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.00, B.11.04, B.11.11, B.11.23 running TCP/IP. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00579189-5
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-KRN", patch_list:['PHNE_30161'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS2-KRN", patch_list:['PHKL_31500'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_33427'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Streams.STREAMS-KRN", patch_list:['PHNE_34131'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02108.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02108.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02108.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,269 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for sendmail HPSBUX02108
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835052);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02108");
+  script_cve_id("CVE-2006-0058");
+  script_name(english: "HP-UX Update for sendmail HPSBUX02108");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A vulnerability has been identified in sendmailwhich may allow a remote 
+  attacker to execute arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  sendmail on
+  HP-UX B.11.23 running sendmail 8.13.3, sendmail 8.11.1 HP-UX B.11.11 running 
+  sendmail 8.13.3, sendmail 8.11.1, sendmail 8.9.3 HP-UX B.11.04 running 
+  sendmail 8.9.3 HP-UX B.11.00 running sendmail 8.11.1, sendmail 8.9.3, 
+  sendmail 8.8.6 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00629555-11
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of sendmail");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.00.01.009", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_1.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_2.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_3.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_1.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_2.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_3.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-UPGRADE.INET-SMAIL", revision:"B.11.11.02.004", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-UPGRADE.INET2-SMAIL", revision:"B.11.11.02.004", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-UPGRADE.INETSVCS-SMAIL", revision:"B.11.11.02.004", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET31734_1.INETSVCS2-RUN", patch_list:['PHNE_35485'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET31734_3.INETSVCS2-RUN", patch_list:['PHNE_35485'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET31734_4.INETSVCS2-RUN", patch_list:['PHNE_35485'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_35485'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.04")
+{
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_1.INETSVCS-RUN", patch_list:['PHNE_34927'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_2.INETSVCS-RUN", patch_list:['PHNE_34927'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29773_3.INETSVCS-RUN", patch_list:['PHNE_34927'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_34927'], rls:"HPUX11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-UPGRADE.INET-SMAIL", revision:"B.11.11.02.004", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-UPGRADE.INET2-SMAIL", revision:"B.11.11.02.004", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-UPGRADE.INETSVCS-SMAIL", revision:"B.11.11.02.004", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", revision:"B.11.11.01.010", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29774_1.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29774_2.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"UNOF_INET_29774_3.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02129.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02129.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02129.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for SLP HPSBUX02129
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835029);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02129");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for SLP HPSBUX02129");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in HP-UX when running 
+  Service Locator Protocol (SLP).The vulnerability could be exploited by a 
+  remote user of Service Locator Protocol (SLP) for unauthorized access. 
+
+  Impact:
+  Remote Unauthorized Access
+
+  Affected Software/OS:
+  SLP on
+  HP-UX B.11.11, B.11.23 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00717872-3
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of SLP");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_33508'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"upgrade_SLP.INETSVCS-RUN", revision:"1.2", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02153.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02153.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02153.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Firefox HPSBUX02153
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835169);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02153");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Firefox HPSBUX02153");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with Firefox running 
+  on HP-UX. These vulnerabilities could be exploited remotely resulting in 
+  unauthorized access, elevation of privileges, or Denial of Service (DoS). 
+
+  Impact:
+  Remote unauthorized access or  elevation of privileges or Denial of Service (DoS)
+
+  Affected Software/OS:
+  Firefox on
+  Firefox web browser prior to v2.0.0.11 running on HP-UX B.11.11 and B.11.23. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00771742-7
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Firefox.FFOX-COM", revision:"2.0.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Firefox.FFOX-COM", revision:"2.0.0.11", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02156.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02156.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02156.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,114 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Thunderbird HPSBUX02156
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835179);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02156");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Thunderbird HPSBUX02156");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with Thunderbird 
+  running on HP-UX. These vulnerabilities could be exploited remotely 
+  resulting in unauthorized access, elevation of privileges, or Denial of 
+  Service (DoS). 
+
+  Impact:
+  Remote unauthorized access
+  elevation of privileges
+  Denial of Service (DoS)
+
+  Affected Software/OS:
+  Thunderbird on
+  Thunderbird email application prior to v2.0.0.9 running on HP-UX B.11.11, 
+  B.11.23, and B.11.31. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00774579-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Tbird.TBIRD-COM", revision:"2.0.0.9", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Tbird.TBIRD-COM", revision:"2.0.0.9", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Tbird.TBIRD-COM", revision:"2.0.0.9", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02181.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02181.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02181.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for IPFilter HPSBUX02181
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835088);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02181");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for IPFilter HPSBUX02181");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  IPFilter in combination with PHNE_34474. The vulnerability could be remotely 
+  exploited to create a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  IPFilter on
+  HP-UX B.11.23 running IPFilter with PHNE_34474 installed. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00837319-3
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of IPFilter");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"IPF-HP.IPF-MIN", patch_list:['PHNE_35545', 'PHNE_35766'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02183.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02183.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02183.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,148 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for sendmail HPSBUX02183
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835042);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02183");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for sendmail HPSBUX02183");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  sendmail. This vulnerability could allow a remote user to cause a Denial of 
+  Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  sendmail on
+  HP-UX B.11.00 (obsolete) running sendmail 8.9.3 or sendmail 8.11.1, HP-UX 
+  B.11.11 running sendmail 8.9.3 or sendmail 8.11.1, HP-UX B.11.23 running 
+  sendmail 8.11.1. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00841370-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of sendmail");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", patch_list:['PHNE_35484'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35483'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_35485'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-UPGRADE.INETSVCS-SMAIL", revision:"B.11.11.02.004", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SMAIL-811.INETSVCS-SMAIL", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_35484'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02186.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02186.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02186.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,119 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache Remote Execution of Arbitrary Code HPSBUX02186
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835119);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02186");
+  script_cve_id("CVE-2006-2940", "CVE-2006-2937", "CVE-2006-3738", "CVE-2006-4343", "CVE-2006-4339", "CVE-2005-2969");
+  script_name(english: "HP-UX Update for Apache Remote Execution of Arbitrary Code HPSBUX02186");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with Apache running 
+  on HP-UX. These vulnerabilities could be exploited remotely to allow 
+  execution of arbitrary code, Denial of Service (DoS), or unauthorized 
+  access. 
+
+  Impact:
+  Remote execution of arbitrary code
+  Denial of Service (DoS)
+  and unauthorized access.
+
+  Affected Software/OS:
+  Apache Remote Execution of Arbitrary Code on
+  HP-UX B.11.11, B.11.23, and B.11.31 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00849540-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache Remote Execution of Arbitrary Code");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.58.01", rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.58.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.58.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.58.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02192.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02192.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02192.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,145 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ARPA Transport HPSBUX02192
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835155);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02192");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ARPA Transport HPSBUX02192");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ARPA transport. The vulnerability could be exploited by a local user to 
+  create a Denial of Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  ARPA Transport on
+  HP-UX B.11.11 and B.11.23 running ARPA transport 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00863839-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ARPA Transport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_35182'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN", patch_list:['PHNE_35182'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_35182'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NMS2-KRN", patch_list:['PHNE_35182'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_35182'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_35183'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN", patch_list:['PHNE_35183'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_35183'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NMS2-KRN", patch_list:['PHNE_35183'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_35183'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02195.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02195.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02195.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,121 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Software Distributor (SD) HPSBUX02195
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835145);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02195");
+  script_cve_id("CVE-2006-4334", "CVE-2006-4335", "CVE-2006-4336", "CVE-2006-4337", "CVE-2006-4338");
+  script_name(english: "HP-UX Update for Software Distributor (SD) HPSBUX02195");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with the version of 
+  GZIP delivered by HP-UX Software Distributor (SD). The vulnerability could 
+  be remotely exploited leading to a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  Software Distributor (SD) on
+  HP-UX B.11.11 and B.11.23 running Software Distributor (SD) 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00874667-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Software Distributor (SD)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.GZIP", revision:"B.11.23.0612", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-AGENT", revision:"B.11.23.0612", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-CMDS", revision:"B.11.23.0612", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.GZIP", patch_list:['PHCO_35587'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-AGENT", patch_list:['PHCO_35587'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SW-DIST.SD-CMDS", patch_list:['PHCO_35587'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02196.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02196.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02196.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,697 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Pkg HPSBUX02196
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835095);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02196");
+  script_cve_id("CVE-2007-0243", "CVE-2006-6745", "CVE-2006-6731");
+  script_name(english: "HP-UX Update for HP-UX Pkg HPSBUX02196");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Java Runtime Environment (JRE) and Java Developer Kit (JDK) may allow a 
+  remote user to execute arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code.
+
+  Affected Software/OS:
+  HP-UX Pkg on
+  HP-UX B.11.11 and B.11.23 running Java Runtime Environment (JRE) and Java 
+  Developer Kit (JDK): 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00876579-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Pkg");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.12.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-COM", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-DEMO", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF32", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF64", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20W", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PNV2", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PWV2", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM-DOC", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32-HS", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64-HS", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20-HS", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W-HS", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2-H", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2-H", revision:"1.5.0.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.12.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-COM", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-DEMO", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF32", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF64", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20W", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PNV2", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PWV2", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM-DOC", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32-HS", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64-HS", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20-HS", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W-HS", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2-H", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2-H", revision:"1.5.0.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02203.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02203.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02203.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,164 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Portable File System (PFS) HPSBUX02203
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835135);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02203");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Portable File System (PFS) HPSBUX02203");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in HP-UX with the 
+  Portable File System (PFS). The vulnerability could be exploitedremotely to 
+  gain an increase in privilege. 
+
+  Impact:
+  Remote increase in privilege.
+
+  Affected Software/OS:
+  Portable File System (PFS) on
+  HP-UX B.11.00 (obsolete), B.11.11 and B.11.23. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00913684-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Portable File System (PFS)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", patch_list:['PHKL_28060', 'PHKL_26450', 'PHCO_26449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.C-INC", patch_list:['PHKL_28060', 'PHKL_26450', 'PHCO_26449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHKL_28060', 'PHKL_26450', 'PHCO_26449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHKL_28060', 'PHKL_26450', 'PHCO_26449'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", revision:"S.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.C-INC", revision:"S.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", revision:"S.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", revision:"S.", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-KRN", patch_list:['PHKL_28025', 'PHKL_26269', 'PHCO_25841'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"ProgSupport.C-INC", patch_list:['PHKL_28025', 'PHKL_26269', 'PHCO_25841'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHKL_28025', 'PHKL_26269', 'PHCO_25841'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHKL_28025', 'PHKL_26269', 'PHCO_25841'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02204.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02204.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02204.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,164 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CIFS Server (Samba) HPSBUX02204
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835009);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02204");
+  script_cve_id("CVE-2007-0452");
+  script_name(english: "HP-UX Update for CIFS Server (Samba) HPSBUX02204");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  CIFS Server (Samba).This vulnerability may allow a remote unauthorized user 
+  to create a Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  CIFS Server (Samba) on
+  HP-UX B.11.11, B.11.23, B.11.31 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00943462-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CIFS Server (Samba)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02205.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02205.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02205.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,114 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ARPA Transport HPSBUX02205
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835107);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02205");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ARPA Transport HPSBUX02205");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ARPA Transport. The vulnerability could be exploited by a local user to 
+  create a Denial of Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  ARPA Transport on
+  HP-UX B.11.00 (obsolete) running ARPA Transport. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00944467-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ARPA Transport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.00")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_35729'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-KRN", patch_list:['PHNE_35729'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-PRG", patch_list:['PHNE_35729'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET-RUN", patch_list:['PHNE_35729'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_35729'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Networking.NMS2-KRN", patch_list:['PHNE_35729'], rls:"HPUX11.00"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02217.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02217.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02217.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,308 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Kerberos HPSBUX02217
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835065);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02217");
+  script_cve_id("CVE-2007-1216");
+  script_name(english: "HP-UX Update for Kerberos HPSBUX02217");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified on HP-UX running 
+  Kerberos. The vulnerability could be exploited by remote authorized users to 
+  execute arbitrary code. 
+
+  Impact:
+  Remote arbitrary code execution
+
+  Affected Software/OS:
+  Kerberos on
+  HP-UX B.11.11, B.11.23, and B.11.31 running the 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01056923-3
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Kerberos");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-64SLIB", patch_list:['PHSS_36361'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-IA32SLIB", patch_list:['PHSS_36361'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-IA64SLIB", patch_list:['PHSS_36361'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-SHLIB", patch_list:['PHSS_36361'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-64SLIB-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-E-A-MAN-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-J-E-MAN-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-J-S-MAN-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-PRG-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-RUN-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-SHLIB-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5IA32SLIB-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5IA64SLIB-A", revision:"D.1.3.5.06", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-64SLIB", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-ENG-A-MAN", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-IA32SLIB", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-IA64SLIB", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-JPN-E-MAN", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-JPN-S-MAN", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-PRG", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-RUN", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-SHLIB", patch_list:['PHSS_34991'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-64SLIB-A", revision:"C.1.3.5.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-E-A-MAN-A", revision:"C.1.3.5.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-J-E-MAN-A", revision:"C.1.3.5.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-J-S-MAN-A", revision:"C.1.3.5.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-PRG-A", revision:"C.1.3.5.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-RUN-A", revision:"C.1.3.5.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"krb5client.KRB5-SHLIB-A", revision:"C.1.3.5.06", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-SHLIB", patch_list:['PHSS_36286'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-PRG", patch_list:['PHSS_36286'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-RUN", patch_list:['PHSS_36286'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-ENG-A-MAN", patch_list:['PHSS_36286'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-JPN-E-MAN", patch_list:['PHSS_36286'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-JPN-S-MAN", patch_list:['PHSS_36286'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"KRB5-Client.KRB5-64SLIB", patch_list:['PHSS_36286'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02218.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02218.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02218.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,200 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for CIFS   Server (Samba) HPSBUX02218
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835087);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02218");
+  script_cve_id("CVE-2007-2446", "CVE-2007-2447");
+  script_name(english: "HP-UX Update for CIFS   Server (Samba) HPSBUX02218");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential vulnerabilities have been identified with HP-UX running CIFS 
+  Server (Samba). The vulnerabilities could be exploited remotely to execute 
+  arbitrary code. 
+
+  Impact:
+  Remote arbitrary code execution
+
+  Affected Software/OS:
+  CIFS   Server (Samba) on
+  HP-UX B.11.11, B.11.23, B.11.31 running CIFS Server (Samba) 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01067768-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of CIFS   Server (Samba)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.02", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.02", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.02", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.02", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.02", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.02", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.02", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.02", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02219.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02219.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02219.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,115 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND HPSBUX02219
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835034);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02219");
+  script_cve_id("CVE-2006-4339", "CVE-2007-0493", "CVE-2007-0494");
+  script_name(english: "HP-UX Update for BIND HPSBUX02219");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential vulnerabilities have been identified with HP-UX running BIND. The 
+  vulnerabilities could be exploited remotely tocreate a Denial of Service 
+  (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  BIND on
+  HP-UX B.11.11, and B.11.23 running BIND v9.2.0 or BIND v9.3.2. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01070495-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of BIND");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_35920'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BindUpgrade.BIND-UPGRADE", revision:"C.9.3.2.1.0", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BindUpgrade.BIND2-UPGRADE", revision:"C.9.3.2.1.0", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"B.11.11.01.009", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BindUpgrade.BIND-UPGRADE", revision:"C.9.3.2.1.0", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02225.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02225.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02225.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,122 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Xserver HPSBUX02225
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835130);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02225");
+  script_cve_id("CVE-2006-6101", "CVE-2006-6102", "CVE-2006-6103");
+  script_name(english: "HP-UX Update for Xserver HPSBUX02225");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with HP-UX running 
+  Xserver. These vulnerabilities could be exploited by a local user to create 
+  a Denial of Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  Xserver on
+  HP-UX B.11.11, B.11.23, B.1131 running Xserver 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01075678-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Xserver");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.X11-SERV", patch_list:['PHSS_36123'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Xserver.OEM-SERVER", patch_list:['PHSS_36123'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.X11-SERV", patch_list:['PHSS_36452'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Xserver.OEM-SERVER", patch_list:['PHSS_36452'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Xserver.X11-SERV", patch_list:['PHSS_34389'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02247.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02247.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02247.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ARPA Transport HPSBUX02247
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835111);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02247");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ARPA Transport HPSBUX02247");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ARPA Transport. The vulnerability could be exploited locally by an 
+  authorized user to create a Denial of Service (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  ARPA Transport on
+  HP-UX B.11.11, B.11.23 running ARPA Transport. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01090656-3
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ARPA Transport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_35766'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_35351'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02248.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02248.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02248.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ARPA Transport HPSBUX02248
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835046);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02248");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for ARPA Transport HPSBUX02248");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ARPA Transport. The vulnerability could be exploited remotely to create a 
+  Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  ARPA Transport on
+  HP-UX B.11.11, B.11.23, B.11.31 running ARPA Transport. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01087206-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ARPA Transport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_35352'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_35766'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_35351'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02249.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02249.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02249.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,125 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for the Ignite-UX or the DynRootDisk (DRD) get_system_info Command HPSBUX02249
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835170);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02249");
+  script_cve_id("CVE-2007-4590");
+  script_name(english: "HP-UX Update for the Ignite-UX or the DynRootDisk (DRD) get_system_info Command HPSBUX02249");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in HP-UX running the 
+  Ignite-UX or the DynRootDisk (DRD) get_system_info command. This command can 
+  change system networking parameters without notification (unqualified 
+  configuration change). 
+
+  Impact:
+  Local unqualified configuration change
+
+  Affected Software/OS:
+  the Ignite-UX or the DynRootDisk (DRD) get_system_info Command on
+  HP-UX B.11.11, B.11.23, B.11.31 running the Ignite-UX vC.7.0.212, vC.7.1.93, 
+  vC.7.2.94, vC.7.3.144 or the DynRootDisk (DRD) vA.1.0.16.417, vA.1.0.18.245, 
+  vA.1.1.0.344, vA.2.0.0.592 get_system_info command. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01118367-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of the Ignite-UX or the DynRootDisk (DRD) get_system_info Command");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"C.7.3.148", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DRD.DRD-RUN", revision:"A.3.0.0", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"C.7.3.148", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DRD.DRD-RUN", revision:"A.3.0.0", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Ignite-UX.MGMT-TOOLS", revision:"C.7.3.148", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02251.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02251.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02251.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,121 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND HPSBUX02251
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835018);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02251");
+  script_cve_id("CVE-2007-2926");
+  script_name(english: "HP-UX Update for BIND HPSBUX02251");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified with HP-UX running BIND. The 
+  vulnerability could be exploited remotely tocause DNS cache poisoning. 
+
+  Impact:
+  Remote DNS cache poisoning
+
+  Affected Software/OS:
+  BIND on
+  HP-UX B.11.11, B.11.23, B.11.31 running BIND v9.2.0 or BIND v9.3.2 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01123426-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of BIND");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"NameService.BIND-RUN", revision:"C.9.3.2.1.0", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_36973'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BindUpgrade.BIND2-UPGRADE", revision:"C.9.3.2.2.0", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"BINDv920.INETSVCS-BIND", revision:"D920", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"BindUpgrade.BIND-UPGRADE", revision:"C.9.3.2.2.0", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02259.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02259.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02259.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,111 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for logins(1M) HPSBUX02259
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835086);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02259");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for logins(1M) HPSBUX02259");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in HP-UX running the 
+  logins(1M) command. This command incorrectly reports password status. As a 
+  result password issues may not be detected, allowing remote unauthorized 
+  access. 
+
+  Impact:
+  Remote unauthorized access.
+
+  Affected Software/OS:
+  logins(1M) on
+  HP-UX B.11.11, B.11.23, B.11.31 running logins(1M) 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01167886-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of logins(1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"SOE.SOE", patch_list:['PHCO_36003'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"SOE.SOE", patch_list:['PHCO_36808'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"SOE.SOE", patch_list:['PHCO_36809'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02262.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02262.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02262.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX02262
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835005);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02262");
+  script_cve_id("CVE-2005-2090", "CVE-2006-5752", "CVE-2007-0450", "CVE-2007-0774", "CVE-2007-1355", "CVE-2007-1358", "CVE-2007-1860", "CVE-2007-1863", "CVE-2007-1887", "CVE-2007-1900", "CVE-2007-2449", "CVE-2007-2450", "CVE-2007-2756", "CVE-2007-2872", "CVE-2007-3382", "CVE-2007-3385", "CVE-2007-3386");
+  script_name(english: "HP-UX Update for Apache HPSBUX02262");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with Apache running 
+  on HP-UX. The vulnerabilities could be exploited remotely via Cross Site 
+  Scripting (XSS) to execute arbitrary code. 
+
+  Impact:
+  Remote arbitrary code execution
+  cross site scripting (XSS)
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.11, B.11.23, B.11.31 running Apache 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01178795-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.59.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02273.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02273.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02273.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,116 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX02273
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835080);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02273");
+  script_cve_id("CVE-2007-3847", "CVE-2007-3304");
+  script_name(english: "HP-UX Update for Apache HPSBUX02273");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX Apache 
+  v2.0.59.00. The vulnerability could be exploited remotely to create an 
+  unauthorized Denial of Service (DoS). 
+
+  Impact:
+  Remote unauthorized Denial of Service  (DoS)
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.0.59.00 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01182588-5
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.0", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.0", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.59.00.0", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.0", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02277.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02277.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02277.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,236 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for OpenSSL HPSBUX02277
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835067);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02277");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for OpenSSL HPSBUX02277");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX OpenSSL. 
+  The vulnerability could be exploited locally to create a Denial of Service 
+  (DoS). 
+
+  Impact:
+  Local Denial of Service (DoS)
+
+  Affected Software/OS:
+  OpenSSL on
+  HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01203958-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of OpenSSL");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CER", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CONF", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-INC", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-LIB", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-MIS", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PRNG", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PVT", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-RUN", revision:"A.00.09.08d.003", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CER", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CONF", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-INC", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-LIB", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-MIS", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PRNG", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PVT", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-RUN", revision:"A.00.09.07l.007", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CER", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CONF", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-INC", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-LIB", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-MIS", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PRNG", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PVT", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-RUN", revision:"A.00.09.07l.006", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02284.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02284.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02284.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,698 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Java JRE and JDK HPSBUX02284
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835094);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02284");
+  script_cve_id("CVE-2007-5240", "CVE-2007-5239", "CVE-2007-5236", "CVE-2007-5237", "CVE-2007-5238", "CVE-2007-5273", "CVE-2007-5274", "CVE-2007-5232", "CVE-2007-5689");
+  script_name(english: "HP-UX Update for Java JRE and JDK HPSBUX02284");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified in Java Runtime 
+  Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These 
+  vulnerabilities may allow remote unauthorized access. 
+
+  Impact:
+  Remote unauthorized access
+
+  Affected Software/OS:
+  Java JRE and JDK on
+  HP-UX B.11.11, B.11.23, and B.11.31 running Java Runtime Environment (JRE) 
+  v5.0.10 and earlier, and Java Developer Kit (JDK), v1.4.2.16 and earlier. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01234533-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Java JRE and JDK");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.17.00", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-COM", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-DEMO", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF32", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF64", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20W", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PNV2", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PWV2", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM-DOC", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32-HS", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64-HS", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20-HS", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W-HS", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2-H", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2-H", revision:"1.5.0.11", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-COM-DOC", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-IPF32", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jpi14.JPI14-PA11", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-COM", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-DEMO", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF32", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-IPF64", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA11", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PA20W", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PNV2", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk14.JDK14-PWV2", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-COM-DOC", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF32-HS", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-IPF64-HS", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA11-HS", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20-HS", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PA20W-HS", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PNV2-H", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre14.JRE14-PWV2-H", revision:"1.4.2.17.00", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-COM", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-DEMO", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF32", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-IPF64", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PA20W", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PNV2", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jdk15.JDK15-PWV2", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-COM-DOC", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF32-HS", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-IPF64-HS", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20-HS", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PA20W-HS", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PNV2-H", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"Jre15.JRE15-PWV2-H", revision:"1.5.0.11", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02285.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02285.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02285.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Aries PA Emulator HPSBUX02285
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835126);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02285");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for Aries PA Emulator HPSBUX02285");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in the Aries PA-RISC 
+  emulation software running on HP-UX IA-64 platforms only. This vulnerability 
+  may allow local unauthorized access. 
+
+  Impact:
+  Local unauthorized access
+
+  Affected Software/OS:
+  Aries PA Emulator on
+  HP-UX B.11.23 (IA), and B.11.31 running all versions of Aries PA-RISC 
+  emulation software. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01241483-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Aries PA Emulator");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-64SLIB", patch_list:['PHSS_36311'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-SHLIBS", patch_list:['PHSS_36311'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-64SLIB", patch_list:['PHSS_35528'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-SHLIBS", patch_list:['PHSS_35528'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02286.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02286.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02286.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,121 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for System Administration Manager (SAM) HPSBUX02286
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835171);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02286");
+  script_cve_id("CVE-2008-1662");
+  script_name(english: "HP-UX Update for System Administration Manager (SAM) HPSBUX02286");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified in HP-UX running 
+  System Administration Manager (SAM). This vulnerability may allow unintended 
+  remote access. 
+
+  Impact:
+  
+
+  Affected Software/OS:
+  System Administration Manager (SAM) on
+  HP-UX B.11.11 and B.11.23 running SAM. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01367453-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of System Administration Manager (SAM)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHCO_36563'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_36563'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.SAM", patch_list:['PHCO_36563'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-BOOT", patch_list:['PHCO_36562'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.UX-CORE", patch_list:['PHCO_36562'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"SystemAdmin.SAM", patch_list:['PHCO_36562'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02287.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02287.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02287.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP Secure Shell HPSBUX02287
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835082);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02287");
+  script_cve_id("CVE-2007-4752");
+  script_name(english: "HP-UX Update for HP Secure Shell HPSBUX02287");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running HP 
+  Secure Shell. The vulnerability could be exploited remotely to gain extended 
+  privileges. 
+
+  Impact:
+  Remotely gain extended privileges
+
+  Affected Software/OS:
+  HP Secure Shell on
+  HP-UX B.11.11, B.11.23, and B.11.31 running HP Secure Shell 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01271085-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP Secure Shell");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.04.70.005", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.04.70.004", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.04.70.003", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02289.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02289.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02289.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,83 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND 8 HPSBUX02289
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835083);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02289");
+  script_cve_id("CVE-2007-2930");
+  script_name(english: "HP-UX Update for BIND 8 HPSBUX02289");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential vulnerability has been identified with HP-UX running BIND 8. The 
+  vulnerability could be exploited remotely tocause DNS cache poisoning. 
+
+  Impact:
+  Remote DNS cache poisoning
+
+  Affected Software/OS:
+  BIND 8 on
+  HP-UX B.11.11 running BIND v8 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01283837-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of BIND 8");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_36185'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02292.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02292.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02292.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,115 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX02292
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835022);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02292");
+  script_cve_id("CVE-2007-5135");
+  script_name(english: "HP-UX Update for Apache HPSBUX02292");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX Apache. 
+  The vulnerability could be exploited remotely to execute arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.0.59.00.0 or earlier. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01290398-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.1", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.1", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.59.00.1", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.1", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02294.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02294.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02294.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,176 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for DCE HPSBUX02294
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835162);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02294");
+  script_cve_id("CVE-2007-6195");
+  script_name(english: "HP-UX Update for DCE HPSBUX02294");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX 
+  applications running DCE such as Software Distributor (SD). The 
+  vulnerability could be exploited remotely to create a denial of service 
+  (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  DCE on
+  HP-UX B.11.11 and B.11.23 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01294212-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of DCE");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-DTS", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-RUN", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-COR-PA-RUN", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-COR-IA-RUN", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-COR-64SLIB", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-IA64-SHLIB", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCEC-ENG-A-MAN", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-CoreTools.DCE-BPRG", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-CoreTools.DCEP-ENG-A-MAN", patch_list:['PHSS_36005'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCEC-ENG-A-MAN", patch_list:['PHSS_36004'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-DTS", patch_list:['PHSS_36004'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-RUN", patch_list:['PHSS_36004'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-CORE-SHLIB", patch_list:['PHSS_36004'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"DCE-Core.DCE-COR-64SLIB", patch_list:['PHSS_36004'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02295.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02295.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02295.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,230 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for rpc.yppasswdd HPSBUX02295
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835102);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02295");
+  script_cve_id("");
+  script_name(english: "HP-UX Update for rpc.yppasswdd HPSBUX02295");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  rpc.yppasswdd. The vulnerability could be exploited remotely to create a 
+  denial of service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  rpc.yppasswdd on
+  HP-UX B.11.11, B.11.23, and B.11.31 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01294324-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of rpc.yppasswdd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-SERVER", patch_list:['PHNE_36449'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-ENG-A-MAN", patch_list:['PHNE_36260'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS-CORE", patch_list:['PHNE_36260'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_36260'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_36260'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-CLIENT", patch_list:['PHNE_36260'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-CORE", patch_list:['PHNE_36260'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS2-SERVER", patch_list:['PHNE_36260'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NFS.KEY-CORE", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64ALIB", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-64SLIB", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CLIENT", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-CORE", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-ENG-A-MAN", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-PRG", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SERVER", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-SHLIBS", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CLIENT", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-CORE", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NIS-SERVER", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NISPLUS-CORE", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE-ENG-A-MAN", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NFS.NFS-KRN", patch_list:['PHNE_36168'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02296.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02296.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02296.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,237 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for OpenSSL HPSBUX02296
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835055);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02296");
+  script_cve_id("CVE-2007-4995");
+  script_name(english: "HP-UX Update for OpenSSL HPSBUX02296");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  OpenSSL. The vulnerability could be exploited remotely to execute arbitrary 
+  code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  OpenSSL on
+  HP-UX B.11.11 and B.11.23 running OpenSSL before vA.00.09.07m, and B.11.31 
+  running OpenSSL before vA.00.09.08g. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01299773-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of OpenSSL");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CER", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CONF", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-INC", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-LIB", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-MIS", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PRNG", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PVT", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-RUN", revision:"A.00.09.08g.001", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CER", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CONF", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-INC", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-LIB", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-MIS", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PRNG", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PVT", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-RUN", revision:"A.00.09.07m.003", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CER", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-CONF", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-INC", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-LIB", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-MIS", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PRNG", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-PVT", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"openssl.OPENSSL-RUN", revision:"A.00.09.07m.002", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02303.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02303.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02303.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for X Font Server (xfs) Software HPSBUX02303
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835186);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02303");
+  script_cve_id("CVE-2007-4990");
+  script_name(english: "HP-UX Update for X Font Server (xfs) Software HPSBUX02303");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  the X Font Server (xfs). The vulnerability could be exploited remotely to 
+  execute arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  X Font Server (xfs) Software on
+  HP-UX B.11.11, B.11.23, B.11.31 running the X Font Server (xfs). 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01323725-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of X Font Server (xfs) Software");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_37226'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_37225'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"X11.X11-FONTSRV", patch_list:['PHSS_37224'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ARPA Transport HPSBUX02306
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835173);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02306");
+  script_cve_id("CVE-2007-6425");
+  script_name(english: "HP-UX Update for ARPA Transport HPSBUX02306");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ARPA Transport. The vulnerability could be exploited remotely to create a 
+  Denial of Service (DoS). 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  ARPA Transport on
+  HP-UX B.11.31 running ARPA Transport. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01328657-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ARPA Transport");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Networking.NET2-KRN", patch_list:['PHNE_36281'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.CORE2-KRN", patch_list:['PHNE_36281'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02308.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02308.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02308.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,115 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX02308
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835188);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02308");
+  script_cve_id("CVE-2007-2872", "CVE-2007-3378", "CVE-2007-4887", "CVE-2007-5000");
+  script_name(english: "HP-UX Update for Apache HPSBUX02308");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities has been identified with HP-UX Apache. 
+  These vulnerabilities could be exploited remotely to execute arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.0.59.00.1 or earlier. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01345501-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.2", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.2", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.59.00.2", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.2", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02313.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02313.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02313.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,116 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache HPSBUX02313
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835168);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02313");
+  script_cve_id("CVE-2007-6388");
+  script_name(english: "HP-UX Update for Apache HPSBUX02313");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Apache. The vulnerability could be exploited remotely resulting in cross 
+  site scripting (XSS). 
+
+  Impact:
+  Cross site scripting (XSS)
+
+  Affected Software/OS:
+  Apache on
+  HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.0.59.00.2 or earlier. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01364714-5
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.3", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.3", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"A.2.0.59.00.3", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE", revision:"B.2.0.59.00.3", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02316.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02316.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02316.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,201 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP CIFS Server (Samba) HPSBUX02316
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835189);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02316");
+  script_cve_id("CVE-2007-4572", "CVE-2007-5398", "CVE-2007-6015");
+  script_name(english: "HP-UX Update for HP CIFS Server (Samba) HPSBUX02316");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running HP 
+  CIFS Server (Samba). The vulnerability could be exploited remotely to 
+  execute arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  HP CIFS Server (Samba) on
+  HP CIFS Server vA.02.03.02 or earlier running on HP-UX B.11.11, B.11.23, and 
+  B.11.31. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01377687-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP CIFS Server (Samba)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.03", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.03", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.03", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.03", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.03", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.03", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.03", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.03", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.03", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.03", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.03", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.03", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.03", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02324.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02324.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02324.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,489 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Netscape Directory Server (NDS) HPSBUX02324
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835174);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02324");
+  script_cve_id("CVE-2008-0892");
+  script_name(english: "HP-UX Update for Netscape Directory Server (NDS) HPSBUX02324");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Netscape Directory Server (NDS). The vulnerability could be used locally to 
+  gain extended privileges. 
+
+  Impact:
+  Local gain extended privileges.
+
+  Affected Software/OS:
+  Netscape Directory Server (NDS) on
+  HP-UX B.11.11, B.11.23, and B.11.31 running Netscape Directory Server (NDS) 
+  vB.06.21.40 or earlier and vB.07.10.40 or earlier. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01433676-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Netscape Directory Server (NDS)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-ADM", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BASE", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BSCLNT", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BSJRE", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-NC", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-NSPERL", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-PERLDAP", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-RUN", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SLAPD", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SLCLNT", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SVCORE", revision:"B.07.10.40", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-ADM", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BASE", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BSCLNT", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BSJRE", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-NC", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-NSPERL", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-PERLDAP", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-RUN", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLAPD", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLCLNT", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SVCORE", revision:"B.06.21.60", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-ADM", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BASE", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BSCLNT", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BSJRE", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-NC", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-NSPERL", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-PERLDAP", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-RUN", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SLAPD", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SLCLNT", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SVCORE", revision:"B.07.10.40", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-ADM", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BASE", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BSCLNT", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BSJRE", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-NC", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-NSPERL", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-PERLDAP", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-RUN", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLAPD", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLCLNT", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SVCORE", revision:"B.06.21.60", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-ADM", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BASE", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BSCLNT", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-BSJRE", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-NC", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-NSPERL", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-PERLDAP", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-RUN", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SLAPD", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SLCLNT", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr7.NDS-SVCORE", revision:"B.07.10.40", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-ADM", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BASE", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BSCLNT", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-BSJRE", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-NC", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-NSPERL", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-PERLDAP", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-RUN", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLAPD", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SLCLNT", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NetscapeDirSvr6.NDS-SVCORE", revision:"B.06.21.60", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02330.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02330.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02330.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,218 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for LDAP-UX HPSBUX02330
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835175);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02330");
+  script_cve_id("CVE-2008-1659");
+  script_name(english: "HP-UX Update for LDAP-UX HPSBUX02330");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  LDAP-UX. This vulnerability could be exploited to gain local unauthorized 
+  access. 
+
+  Impact:
+  Local unauthorized access
+
+  Affected Software/OS:
+  LDAP-UX on
+  HP-UX B.11.11, B.11.23, B.11.31 running LDAP-UX vB.04.10 to vB.04.15. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01447010-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of LDAP-UX");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.ADMIN-RUN", revision:"B.04.17", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.CORE-RUN", revision:"B.04.17", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDAP-C-SDK", revision:"B.04.17", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDUX-ENG-A-MAN", revision:"B.04.17", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.NATIVELDAP-RUN", revision:"B.04.17", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.PAM-AUTHZ-RUN", revision:"B.04.17", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NisLdapServer.YPLDAP-SERVER", revision:"B.04.17", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.ADMIN-RUN", revision:"B.04.17", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.CORE-RUN", revision:"B.04.17", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDAP-C-SDK", revision:"B.04.17", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDUX-ENG-A-MAN", revision:"B.04.17", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.NATIVELDAP-RUN", revision:"B.04.17", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.PAM-AUTHZ-RUN", revision:"B.04.17", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NisLdapServer.YPLDAP-SERVER", revision:"B.04.17", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.ADMIN-RUN", revision:"B.04.17", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.CORE-RUN", revision:"B.04.17", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDAP-C-SDK", revision:"B.04.17", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.LDUX-ENG-A-MAN", revision:"B.04.17", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.NATIVELDAP-RUN", revision:"B.04.17", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"LdapUxClient.PAM-AUTHZ-RUN", revision:"B.04.17", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"NisLdapServer.YPLDAP-SERVER", revision:"B.04.17", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02332.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02332.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02332.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,154 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache With PHP HPSBUX02332
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835181);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02332");
+  script_cve_id("CVE-2007-2872", "CVE-2007-3378", "CVE-2007-4783", "CVE-2007-4840", "CVE-2007-4887", "CVE-2007-5898", "CVE-2007-5899", "CVE-2007-5900");
+  script_name(english: "HP-UX Update for Apache With PHP HPSBUX02332");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  Potential security vulnerabilities have been identified with HP-UX running 
+  Apache with PHP. These vulnerabilities could be exploited remotely to create 
+  a Denial of Service (DoS) or to gain extended privileges. 
+
+  Impact:
+  Remote Denial of Service (DoS)
+  gain extended privileges.
+
+  Affected Software/OS:
+  Apache With PHP on
+  HP-UX B.11.11, B.11.23, B.11.31 running Apache v2.18 with PHP v5.2.4 or 
+  earlier. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01438646-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache With PHP");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP", revision:"B.2.0.59.04.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP2", revision:"B.2.0.59.04.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP", revision:"B.2.0.59.04.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP2", revision:"B.2.0.59.04.01", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP", revision:"B.2.0.59.04.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP2", revision:"B.2.0.59.04.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP", revision:"B.2.0.59.04.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP2", revision:"B.2.0.59.04.01", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP", revision:"B.2.0.59.04.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP2", revision:"B.2.0.59.04.01", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02334.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02334.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02334.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for ftp HPSBUX02334
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835177);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02334");
+  script_cve_id("CVE-2008-0713");
+  script_name(english: "HP-UX Update for ftp HPSBUX02334");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  ftp. The vulnerability could be exploited remotely to create a Denial of 
+  Service (DoS). The Denial of Service (DoS) affects the ftp server 
+  application only. 
+
+  Impact:
+  Remote Denial of Service (DoS)
+
+  Affected Software/OS:
+  ftp on
+  HP-UX B.11.11, B.11.23, B.11.31 running ftp. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01446326-4
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of ftp");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"FTP.FTP-AUX", revision:"C.2.6.1.3.0", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"FTP.FTP-RUN", revision:"C.2.6.1.3.0", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS2-RUN", patch_list:['PHNE_36193'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"InternetSrvcs.INETSVCS-RUN", patch_list:['PHNE_36192'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"WUFTP-26.INETSVCS-FTP", revision:"B.11.11.01.011", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02335.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02335.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02335.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,134 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for useradd(1M) HPSBUX02335
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835187);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02335");
+  script_cve_id("CVE-2008-1660");
+  script_name(english: "HP-UX Update for useradd(1M) HPSBUX02335");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified HP-UX running the 
+  useradd(1M) command. The vulnerability could be exploited locally to allow 
+  unauthorized access to directories or files. 
+
+  Impact:
+  Local unauthorized access
+
+  Affected Software/OS:
+  useradd(1M) on
+  HP-UX B.11.11, B.11.23, B.11.31 running the useradd(1M) command 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01455884-2
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of useradd(1M)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.ADMN-ENG-A-MAN", patch_list:['PHCO_36953'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.SYS2-ADMIN", patch_list:['PHCO_36953'], rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.ADMN-ENG-A-MAN", patch_list:['PHCO_37291'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.SYS-ADMIN", patch_list:['PHCO_37291'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.SYS2-ADMIN", patch_list:['PHCO_37291'], rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.ADMN-ENG-A-MAN", patch_list:['PHCO_37290'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"OS-Core.SYS-ADMIN", patch_list:['PHCO_37290'], rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02337.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02337.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02337.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP-UX Secure Shell HPSBUX02337
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835178);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02337");
+  script_cve_id("CVE-2008-1483");
+  script_name(english: "HP-UX Update for HP-UX Secure Shell HPSBUX02337");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  HP-UX Secure Shell. The vulnerability could be exploited locally to gain 
+  unauthorized access and create a Denial of Service (DoS). 
+
+  Impact:
+  Local unauthorized access and Denial of Service (DoS)
+
+  Affected Software/OS:
+  HP-UX Secure Shell on
+  HP-UX B.11.11, B.11.23, B.11.31 running HP-UX Secure Shell prior to vA.05.00 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01462841-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP-UX Secure Shell");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.05.00.014", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.05.00.013", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"Secure_Shell.SECURE_SHELL", revision:"A.05.00.012", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02341.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02341.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02341.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,201 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for HP CIFS Server (Samba) HPSBUX02341
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835166);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02341");
+  script_cve_id("CVE-2007-4572", "CVE-2007-5398", "CVE-2007-6015", "CVE-2008-1105");
+  script_name(english: "HP-UX Update for HP CIFS Server (Samba) HPSBUX02341");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerabilities has been identified with HP-UX running 
+  HP CIFS Server (Samba). The vulnerabilities could be exploited remotely to 
+  execute arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code
+
+  Affected Software/OS:
+  HP CIFS Server (Samba) on
+  HP CIFS Server vA.02.01.*, vA.02.02.*, and vA.2.03.* prior to vA.02.03.04 
+  running on HP-UX B.11.11, B.11.23, and B.11.31. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657-1
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of HP CIFS Server (Samba)");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.04", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.04", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.04", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.04", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.04", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.04", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.04", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-ADMIN", revision:"A.02.03.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-DOC", revision:"A.02.03.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-LIB", revision:"A.02.03.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-MAN", revision:"A.02.03.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-RUN", revision:"A.02.03.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"CIFS-Server.CIFS-UTIL", revision:"A.02.03.04", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02342.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02342.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02342.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,152 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for Apache with PHP HPSBUX02342
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835180);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02342");
+  script_cve_id("CVE-2008-0599");
+  script_name(english: "HP-UX Update for Apache with PHP HPSBUX02342");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identified with HP-UX running 
+  Apache with PHP. This vulnerability could be exploited remotely to execute 
+  arbitrary code. 
+
+  Impact:
+  Remote execution of arbitrary code.
+
+  Affected Software/OS:
+  Apache with PHP on
+  HP-UX B.11.11, B.11.23, B.11.31 running Apache with PHP v5.2.5 or earlier. 
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01476437-3
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of Apache with PHP");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"HP-UX Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-hpux.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "HPUX11.31")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP", revision:"B.2.0.59.04.2", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP2", revision:"B.2.0.59.04.2", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP", revision:"B.2.0.59.04.2", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP2", revision:"B.2.0.59.04.2", rls:"HPUX11.31"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.23")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP", revision:"B.2.0.59.04.2", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPCH32.PHP2", revision:"B.2.0.59.04.2", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP", revision:"B.2.0.59.04.2", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP2", revision:"B.2.0.59.04.2", rls:"HPUX11.23"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "HPUX11.11")
+{
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP", revision:"B.2.0.59.04.2", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(ishpuxpkgvuln(pkg:"hpuxwsAPACHE.PHP2", revision:"B.2.0.59.04.2", rls:"HPUX11.11"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl	2009-05-05 10:03:09 UTC (rev 3234)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl	2009-05-05 10:14:23 UTC (rev 3235)
@@ -0,0 +1,153 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# HP-UX Update for BIND HPSBUX02351
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(835164);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "HPSBUX", value: "02351");
+  script_cve_id("CVE-2008-1447");
+  script_name(english: "HP-UX Update for BIND HPSBUX02351");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  A potential security vulnerability has been identi