[Openvas-commits] r11945 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Nov 2 17:15:24 CET 2011


Author: hdoreau
Date: 2011-11-02 17:13:56 +0100 (Wed, 02 Nov 2011)
New Revision: 11945

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0373.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1180.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1211.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl
   trunk/openvas-plugins/scripts/Yap_Blog_remote-file_include.nasl
   trunk/openvas-plugins/scripts/aas_detect.nasl
   trunk/openvas-plugins/scripts/abyss_msdos_dos.nasl
   trunk/openvas-plugins/scripts/badblue_get_DoS.nasl
   trunk/openvas-plugins/scripts/bugbear_b.nasl
   trunk/openvas-plugins/scripts/deb_041_1.nasl
   trunk/openvas-plugins/scripts/deb_1022_1.nasl
   trunk/openvas-plugins/scripts/deb_1084_1.nasl
   trunk/openvas-plugins/scripts/deb_1146_1.nasl
   trunk/openvas-plugins/scripts/deb_1223_1.nasl
   trunk/openvas-plugins/scripts/deb_1227_1.nasl
   trunk/openvas-plugins/scripts/deb_1341_1.nasl
   trunk/openvas-plugins/scripts/deb_1444_1.nasl
   trunk/openvas-plugins/scripts/deb_1465_2.nasl
   trunk/openvas-plugins/scripts/deb_1470_1.nasl
   trunk/openvas-plugins/scripts/deb_1562_1.nasl
   trunk/openvas-plugins/scripts/deb_1586_1.nasl
   trunk/openvas-plugins/scripts/deb_1629_2.nasl
   trunk/openvas-plugins/scripts/deb_1646_2.nasl
   trunk/openvas-plugins/scripts/deb_1663_1.nasl
   trunk/openvas-plugins/scripts/deb_1710_1.nasl
   trunk/openvas-plugins/scripts/deb_1806_1.nasl
   trunk/openvas-plugins/scripts/deb_1878_1.nasl
   trunk/openvas-plugins/scripts/deb_192_2.nasl
   trunk/openvas-plugins/scripts/deb_2053_1.nasl
   trunk/openvas-plugins/scripts/deb_2126_1.nasl
   trunk/openvas-plugins/scripts/deb_2183_1.nasl
   trunk/openvas-plugins/scripts/deb_247_1.nasl
   trunk/openvas-plugins/scripts/deb_292_2.nasl
   trunk/openvas-plugins/scripts/deb_420_1.nasl
   trunk/openvas-plugins/scripts/deb_443_1.nasl
   trunk/openvas-plugins/scripts/deb_459_1.nasl
   trunk/openvas-plugins/scripts/deb_615_1.nasl
   trunk/openvas-plugins/scripts/deb_636_1.nasl
   trunk/openvas-plugins/scripts/deb_742_1.nasl
   trunk/openvas-plugins/scripts/deb_790_1.nasl
   trunk/openvas-plugins/scripts/deb_811_1.nasl
   trunk/openvas-plugins/scripts/deb_871_1.nasl
   trunk/openvas-plugins/scripts/deb_990_1.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12305.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12827.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13250.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1699.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3280.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3794.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6695.nasl
   trunk/openvas-plugins/scripts/fcore_2009_7491.nasl
   trunk/openvas-plugins/scripts/freebsd_apache3.nasl
   trunk/openvas-plugins/scripts/freebsd_bind0.nasl
   trunk/openvas-plugins/scripts/freebsd_cyrus-imapd.nasl
   trunk/openvas-plugins/scripts/freebsd_gaim15.nasl
   trunk/openvas-plugins/scripts/freebsd_ghostscript-gnu.nasl
   trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl
   trunk/openvas-plugins/scripts/freebsd_kdebase0.nasl
   trunk/openvas-plugins/scripts/freebsd_kdelibs.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin.nasl
   trunk/openvas-plugins/scripts/freebsd_linux_base.nasl
   trunk/openvas-plugins/scripts/freebsd_mediawiki0.nasl
   trunk/openvas-plugins/scripts/freebsd_mediawiki4.nasl
   trunk/openvas-plugins/scripts/freebsd_mozilla0.nasl
   trunk/openvas-plugins/scripts/freebsd_phpbb6.nasl
   trunk/openvas-plugins/scripts/freebsd_proftpd1.nasl
   trunk/openvas-plugins/scripts/freebsd_proftpd5.nasl
   trunk/openvas-plugins/scripts/freebsd_python.nasl
   trunk/openvas-plugins/scripts/freebsd_racoon0.nasl
   trunk/openvas-plugins/scripts/freebsd_roundcube.nasl
   trunk/openvas-plugins/scripts/freebsd_rxvt-unicode.nasl
   trunk/openvas-plugins/scripts/freebsd_zhcon.nasl
   trunk/openvas-plugins/scripts/freebsdsa_cvs2.nasl
   trunk/openvas-plugins/scripts/freebsdsa_pf.nasl
   trunk/openvas-plugins/scripts/freebsdsa_ppp.nasl
   trunk/openvas-plugins/scripts/gb_1024_cms_50275.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0104_seamonkey_centos3_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0153_cups_centos3_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0206_cups_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0208_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0209_thunderbird_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0287_libxslt_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0617_vim-common_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0436_firefox_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0585_lftp_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1109_foomatic_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_LightOpenCMS_35497.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0019-01_kernel.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0162-01_openssl.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0528-01_avahi.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0659-01_httpd.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_0312-01_thunderbird.nasl
   trunk/openvas-plugins/scripts/gb_abtp_portal_45290.nasl
   trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl
   trunk/openvas-plugins/scripts/gb_allocPS_47860.nasl
   trunk/openvas-plugins/scripts/gb_apple_safari_cfnetwork_background_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_bugzilla_41397.nasl
   trunk/openvas-plugins/scripts/gb_clamav_43555.nasl
   trunk/openvas-plugins/scripts/gb_collabtive_44050.nasl
   trunk/openvas-plugins/scripts/gb_egroupware_detect.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_0001_libpng10_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2299_bugzilla_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_281_firefox_fc5.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_3474_tomcat5_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_413_ImageMagick_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_414_ImageMagick_fc5.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_4385_xfce-mcs-plugins_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_709_php_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_718_ruby_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_0103_wordpress_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_10482_wordpress_fc10.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_11577_moodle_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_11598_google-gadgets_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_1616_openldap_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_3251_openoffice.org_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_4259_gnutls_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_4990_evolution_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_7104_poppler_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_7395_libxml2_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_7739_amarok_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_7830_bitlbee_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8678_mediawiki_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8764_dbus_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_9712_roundup_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_12258_php-pear-CAS_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14525_libglpng_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14633_ghostscript_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14730_lib3ds_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_16600_cvs_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_16826_kernel_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_17035_gnome-xcf-thumbnailer_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1842_pdfedit_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_19078_mantis_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1936_pcmanx-gtk2_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1936_perl-Gtk2-MozEmbed_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_8547_oxygen-icon-theme_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_0208_evince_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11106_xulrunner_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12145_qt_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12485_zabbix_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_1263_java-1.6.0-openjdk_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_1273_openssl_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8983_asterisk_fc15.nasl
   trunk/openvas-plugins/scripts/gb_firefox_xul_parsing_dos_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_mar11_win.nasl
   trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_lin.nasl
   trunk/openvas-plugins/scripts/gb_ibm_websphere_44862.nasl
   trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl
   trunk/openvas-plugins/scripts/gb_joomla_lyftenbloggie_mult_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_112.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_034.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_042.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_028.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_040.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_084.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_152.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_182.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_188.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_168.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_029.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_140.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_230.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_026.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_109.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_054.nasl
   trunk/openvas-plugins/scripts/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ms_ie_xml_doc_dos_vuln_aug09.nasl
   trunk/openvas-plugins/scripts/gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl
   trunk/openvas-plugins/scripts/gb_netrisk_sec_bypass_vuln.nasl
   trunk/openvas-plugins/scripts/gb_perl_archive_tar_26355.nasl
   trunk/openvas-plugins/scripts/gb_php_detect.nasl
   trunk/openvas-plugins/scripts/gb_phpbb_45005.nasl
   trunk/openvas-plugins/scripts/gb_pivotx_mult_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_qtweb_js_n_data_uri_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_realplayer_code_exec_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_realplayer_ivr_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_realwin_scada_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_nov09_lin.nasl
   trunk/openvas-plugins/scripts/gb_sigplus_pro_activex_detect.nasl
   trunk/openvas-plugins/scripts/gb_snortreport_detect.nasl
   trunk/openvas-plugins/scripts/gb_solaris_111070_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_112797_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_112923_04.nasl
   trunk/openvas-plugins/scripts/gb_solaris_119255_73.nasl
   trunk/openvas-plugins/scripts/gb_solaris_138373_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_138876_01.nasl
   trunk/openvas-plugins/scripts/gb_suse_2010_058.nasl
   trunk/openvas-plugins/scripts/gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl
   trunk/openvas-plugins/scripts/gb_symphony_cms_detect.nasl
   trunk/openvas-plugins/scripts/gb_tinybb_45737.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1002_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1141_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1205_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1242_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_496_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_609_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_616_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_648_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_889_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_903_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_911_1.nasl
   trunk/openvas-plugins/scripts/gb_vmware_prdts_vix_api_mult_vuln.nasl
   trunk/openvas-plugins/scripts/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_vtiger_49927.nasl
   trunk/openvas-plugins/scripts/gb_vtiger_crm_47263.nasl
   trunk/openvas-plugins/scripts/gb_wireshark_lua_script_code_exec_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_xm_easy_personal_ftp_dos_vuln.nasl
   trunk/openvas-plugins/scripts/glsa_200407_19.nasl
   trunk/openvas-plugins/scripts/glsa_200408_13.nasl
   trunk/openvas-plugins/scripts/glsa_200502_15.nasl
   trunk/openvas-plugins/scripts/glsa_200503_01.nasl
   trunk/openvas-plugins/scripts/glsa_200503_19.nasl
   trunk/openvas-plugins/scripts/glsa_200504_05.nasl
   trunk/openvas-plugins/scripts/glsa_200504_24.nasl
   trunk/openvas-plugins/scripts/glsa_200511_11.nasl
   trunk/openvas-plugins/scripts/glsa_200601_10.nasl
   trunk/openvas-plugins/scripts/glsa_200604_15.nasl
   trunk/openvas-plugins/scripts/glsa_200606_18.nasl
   trunk/openvas-plugins/scripts/glsa_200606_19.nasl
   trunk/openvas-plugins/scripts/glsa_200607_03.nasl
   trunk/openvas-plugins/scripts/glsa_200610_05.nasl
   trunk/openvas-plugins/scripts/glsa_200611_17.nasl
   trunk/openvas-plugins/scripts/glsa_200612_06.nasl
   trunk/openvas-plugins/scripts/glsa_200707_12.nasl
   trunk/openvas-plugins/scripts/glsa_200803_07.nasl
   trunk/openvas-plugins/scripts/glsa_200804_16.nasl
   trunk/openvas-plugins/scripts/glsa_200804_30.nasl
   trunk/openvas-plugins/scripts/glsa_201001_03.nasl
   trunk/openvas-plugins/scripts/glsa_201006_20.nasl
   trunk/openvas-plugins/scripts/iWeb_37228.nasl
   trunk/openvas-plugins/scripts/icecast_rbof.nasl
   trunk/openvas-plugins/scripts/imp_detect.nasl
   trunk/openvas-plugins/scripts/macosx_secupd_2009-005.nasl
   trunk/openvas-plugins/scripts/mambo_detect.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_091.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_109.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_123.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_243_2.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_324.nasl
   trunk/openvas-plugins/scripts/metacart_sql.nasl
   trunk/openvas-plugins/scripts/mssql_brute_force.nasl
   trunk/openvas-plugins/scripts/netop_detect_udp.nasl
   trunk/openvas-plugins/scripts/nginx_36438.nasl
   trunk/openvas-plugins/scripts/osticket_setup_php_accessible.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0046.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1504.nasl
   trunk/openvas-plugins/scripts/php_nuke_bb_smilies_passwd.nasl
   trunk/openvas-plugins/scripts/phpgedview_multiple_flaws.nasl
   trunk/openvas-plugins/scripts/psychoblogger_sql_injection.nasl
   trunk/openvas-plugins/scripts/qmtp_detect.nasl
   trunk/openvas-plugins/scripts/remote-MS04-017.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl
   trunk/openvas-plugins/scripts/secpod_cybozu_office_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_code_exec_vuln_jul09_lin.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_dec09_win01.nasl
   trunk/openvas-plugins/scripts/secpod_hyleos_chemview_detect.nasl
   trunk/openvas-plugins/scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-025.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-082.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-017.nasl
   trunk/openvas-plugins/scripts/secpod_ms_iis_detect.nasl
   trunk/openvas-plugins/scripts/secpod_mysql_bof_vuln_lin.nasl
   trunk/openvas-plugins/scripts/secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_mar09_lin.nasl
   trunk/openvas-plugins/scripts/secpod_php_address_book_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_sjs_am_n_opensso_unspecified_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_wordpress_detect_900182.nasl
   trunk/openvas-plugins/scripts/secpod_xtreamerpro_media_server_dir_trav_vuln.nasl
   trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl
   trunk/openvas-plugins/scripts/sles10_expat.nasl
   trunk/openvas-plugins/scripts/sles10_hplip17.nasl
   trunk/openvas-plugins/scripts/sles10_python.nasl
   trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn0.nasl
   trunk/openvas-plugins/scripts/sles9p5009819.nasl
   trunk/openvas-plugins/scripts/sles9p5012017.nasl
   trunk/openvas-plugins/scripts/sles9p5015295.nasl
   trunk/openvas-plugins/scripts/sles9p5015723.nasl
   trunk/openvas-plugins/scripts/sles9p5015928.nasl
   trunk/openvas-plugins/scripts/sles9p5019909.nasl
   trunk/openvas-plugins/scripts/sles9p5021170.nasl
   trunk/openvas-plugins/scripts/sles9p5040200.nasl
   trunk/openvas-plugins/scripts/sles9p5060942.nasl
   trunk/openvas-plugins/scripts/smb_nt_ms02-072.nasl
   trunk/openvas-plugins/scripts/ubuntu_733_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_741_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_754_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_791_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_843_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_850_1.nasl
   trunk/openvas-plugins/scripts/wordpress_37005.nasl
   trunk/openvas-plugins/scripts/writesrv.nasl
   trunk/openvas-plugins/scripts/xedus_detect.nasl
Log:
* scripts/wordpress_37005.nasl,
scripts/gb_fedora_2010_14633_ghostscript_fc12.nasl,
scripts/gb_RHSA-2010_0528-01_avahi.nasl,
scripts/deb_1710_1.nasl,
scripts/sles10_NetworkManager-.nasl,
scripts/gb_fedora_2010_16826_kernel_fc14.nasl,
scripts/metacart_sql.nasl,
scripts/gb_fedora_2007_3474_tomcat5_fc8.nasl,
scripts/gb_fedora_2008_7739_amarok_fc9.nasl,
scripts/secpod_mysql_bof_vuln_lin.nasl,
scripts/deb_1806_1.nasl,
scripts/glsa_200503_01.nasl,
scripts/freebsdsa_pf.nasl,
scripts/sles10_python.nasl,
scripts/deb_2183_1.nasl,
scripts/abyss_msdos_dos.nasl,
scripts/gb_fedora_2008_0103_wordpress_fc8.nasl,
scripts/glsa_200803_07.nasl,
scripts/gb_fedora_2008_3251_openoffice.org_fc8.nasl,
scripts/deb_2053_1.nasl,
scripts/gb_solaris_112797_01.nasl,
scripts/gb_fedora_2007_2299_bugzilla_fc7.nasl,
scripts/gb_mandriva_MDVA_2008_152.nasl,
scripts/deb_1227_1.nasl,
scripts/sles11_mozilla-xulrunn0.nasl,
scripts/gb_CESA-2008_0208_seamonkey_centos4_i386.nasl,
scripts/gb_realplayer_code_exec_vuln_win.nasl,
scripts/gb_graphicsmagick_detect_lin.nasl,
scripts/ubuntu_754_1.nasl,
scripts/gb_fedora_2007_281_firefox_fc5.nasl,
scripts/gb_fedora_2010_8547_oxygen-icon-theme_fc11.nasl,
scripts/macosx_secupd_2009-005.nasl,
scripts/gb_mandriva_MDVSA_2008_230.nasl,
scripts/gb_RHSA-2010_0162-01_openssl.nasl,
scripts/gb_fedora_2010_19078_mantis_fc14.nasl,
scripts/deb_1663_1.nasl,
scripts/gb_fedora_2008_10482_wordpress_fc10.nasl,
scripts/gb_fedora_2010_12258_php-pear-CAS_fc13.nasl,
scripts/xedus_detect.nasl,
scripts/RHSA_2009_1548.nasl,
scripts/gb_mandriva_MDVSA_2010_026.nasl,
scripts/gb_fedora_2011_1263_java-1.6.0-openjdk_fc14.nasl,
scripts/glsa_200408_13.nasl,
scripts/deb_041_1.nasl,
scripts/osticket_setup_php_accessible.nasl,
scripts/gb_RHSA-2010_0659-01_httpd.nasl,
scripts/gb_fedora_2008_8764_dbus_fc9.nasl,
scripts/glsa_200804_30.nasl,
scripts/badblue_get_DoS.nasl,
scripts/remote-MS04-017.nasl,
scripts/gb_mandriva_MDVSA_2008_029.nasl,
scripts/gb_CESA-2011_1109_foomatic_centos5_i386.nasl,
scripts/RHSA_2009_1674.nasl,
scripts/phpgedview_multiple_flaws.nasl,
scripts/glsa_200601_10.nasl,
scripts/deb_459_1.nasl,
scripts/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl,
scripts/gb_vtiger_49927.nasl,
scripts/mdksa_2009_091.nasl,
scripts/writesrv.nasl,
scripts/secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl,
scripts/glsa_200611_17.nasl,
scripts/deb_420_1.nasl,
scripts/deb_443_1.nasl,
scripts/gb_ubuntu_USN_903_1.nasl,
scripts/secpod_opera_mult_vuln_mar09_lin.nasl,
scripts/deb_1586_1.nasl,
scripts/gb_mandriva_MDKA_2007_112.nasl,
scripts/gb_fedora_2008_9712_roundup_fc8.nasl,
scripts/glsa_200407_19.nasl,
scripts/fcore_2009_6695.nasl,
scripts/gb_solaris_138373_02.nasl,
scripts/freebsd_isakmpd.nasl,
scripts/glsa_200504_05.nasl,
scripts/secpod_ms_iis_detect.nasl,
scripts/gb_tinybb_45737.nasl,
scripts/glsa_201006_20.nasl,
scripts/sles9p5019909.nasl,
scripts/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl,
scripts/gb_suse_2010_058.nasl,
scripts/gb_mandriva_MDVA_2008_182.nasl,
scripts/freebsd_python.nasl,
scripts/deb_990_1.nasl,
scripts/gb_mandriva_MDVA_2008_040.nasl,
scripts/gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl,
scripts/secpod_firefox_code_exec_vuln_jul09_lin.nasl,
scripts/gb_fedora_2010_1842_pdfedit_fc11.nasl,
scripts/gb_1024_cms_50275.nasl,
scripts/fcore_2009_7491.nasl,
scripts/deb_292_2.nasl,
scripts/secpod_ms09-025.nasl,
scripts/gb_fedora_2008_7830_bitlbee_fc9.nasl,
scripts/gb_RHSA-2011_0312-01_thunderbird.nasl,
scripts/secpod_cybozu_office_xss_vuln.nasl,
scripts/gb_CESA-2008_0104_seamonkey_centos3_x86_64.nasl,
scripts/gb_CESA-2008_0617_vim-common_centos4_x86_64.nasl,
scripts/gb_allocPS_47860.nasl,
scripts/deb_636_1.nasl,
scripts/glsa_200607_03.nasl,
scripts/gb_fedora_2008_4259_gnutls_fc9.nasl,
scripts/gb_fedora_2007_4385_xfce-mcs-plugins_fc7.nasl,
scripts/gb_CESA-2009_0436_firefox_centos5_i386.nasl,
scripts/gb_fedora_2007_718_ruby_fc6.nasl,
scripts/freebsd_proftpd5.nasl,
scripts/gb_fedora_2010_17035_gnome-xcf-thumbnailer_fc14.nasl,
scripts/secpod_sjs_am_n_opensso_unspecified_vuln.nasl,
scripts/sles9p5015723.nasl,
scripts/gb_solaris_111070_01.nasl,
scripts/freebsd_mediawiki0.nasl,
scripts/imp_detect.nasl,
scripts/deb_247_1.nasl,
scripts/glsa_200610_05.nasl,
scripts/gb_realplayer_ivr_bof_vuln_win.nasl,
scripts/gb_fedora_2010_14730_lib3ds_fc14.nasl,
scripts/gb_ubuntu_USN_1141_1.nasl,
scripts/gb_realwin_scada_bof_vuln.nasl,
scripts/glsa_200707_12.nasl,
scripts/glsa_200804_16.nasl,
scripts/deb_1470_1.nasl,
scripts/gb_joomla_lyftenbloggie_mult_xss_vuln.nasl,
scripts/Yap_Blog_remote-file_include.nasl,
scripts/sles9p5012017.nasl,
scripts/RHSA_2009_1180.nasl,
scripts/gb_fedora_2008_1616_openldap_fc7.nasl,
scripts/deb_1629_2.nasl,
scripts/freebsd_bind0.nasl,
scripts/bugbear_b.nasl,
scripts/gb_CESA-2008_0153_cups_centos3_x86_64.nasl,
scripts/gb_firefox_xul_parsing_dos_vuln_lin.nasl,
scripts/glsa_200504_24.nasl,
scripts/psychoblogger_sql_injection.nasl,
scripts/gb_egroupware_detect.nasl,
scripts/deb_1223_1.nasl,
scripts/gb_pivotx_mult_xss_vuln.nasl,
scripts/sles10_expat.nasl,
scripts/gb_solaris_112923_04.nasl,
scripts/RHSA_2009_0373.nasl,
scripts/gb_symphony_cms_detect.nasl,
scripts/gb_collabtive_44050.nasl,
scripts/gb_fedora_2008_7395_libxml2_fc9.nasl,
scripts/ovcesa2009_0046.nasl,
scripts/deb_2126_1.nasl,
scripts/freebsd_apache3.nasl,
scripts/ubuntu_741_1.nasl,
scripts/gb_qtweb_js_n_data_uri_xss_vuln.nasl,
scripts/gb_xm_easy_personal_ftp_dos_vuln.nasl,
scripts/gb_perl_archive_tar_26355.nasl,
scripts/mssql_brute_force.nasl,
scripts/gb_fedora_2011_8983_asterisk_fc15.nasl,
scripts/freebsd_racoon0.nasl,
scripts/fcore_2009_12305.nasl,
scripts/gb_ingate_siparator_detect.nasl,
scripts/gb_solaris_119255_73.nasl,
scripts/fcore_2009_12827.nasl,
scripts/ovcesa2009_1504.nasl,
scripts/mdksa_2009_324.nasl,
scripts/gb_ubuntu_USN_911_1.nasl,
scripts/icecast_rbof.nasl,
scripts/ubuntu_733_1.nasl,
scripts/qmtp_detect.nasl,
scripts/gb_ubuntu_USN_1242_1.nasl,
scripts/deb_1444_1.nasl,
scripts/secpod_xtreamerpro_media_server_dir_trav_vuln.nasl,
scripts/gb_snortreport_detect.nasl,
scripts/gb_wireshark_lua_script_code_exec_vuln_win.nasl,
scripts/deb_1022_1.nasl,
scripts/gb_sigplus_pro_activex_detect.nasl,
scripts/gb_mandriva_MDVSA_2010_109.nasl,
scripts/gb_fedora_2010_14525_libglpng_fc12.nasl,
scripts/sles9p5015928.nasl,
scripts/gb_solaris_138876_01.nasl,
scripts/iWeb_37228.nasl,
scripts/deb_1341_1.nasl,
scripts/secpod_firefox_mult_vuln_dec09_win01.nasl,
scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl,
scripts/secpod_mahara_xss_n_csrf_vuln.nasl,
scripts/RHSA_2009_0021.nasl,
scripts/freebsd_linux_base.nasl,
scripts/gb_apple_safari_cfnetwork_background_dos_vuln.nasl,
scripts/freebsd_zhcon.nasl,
scripts/gb_bugzilla_41397.nasl,
scripts/fcore_2009_1699.nasl,
scripts/gb_google_chrome_mult_vuln_mar11_win.nasl,
scripts/deb_742_1.nasl,
scripts/freebsd_linux-flashplugin.nasl,
scripts/gb_ms_ie_xml_doc_dos_vuln_aug09.nasl,
scripts/gb_mandriva_MDVA_2008_188.nasl,
scripts/deb_1084_1.nasl,
scripts/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl,
scripts/netop_detect_udp.nasl,
scripts/gb_fedora_2011_12485_zabbix_fc15.nasl,
scripts/freebsdsa_cvs2.nasl,
scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl,
scripts/deb_871_1.nasl,
scripts/glsa_200604_15.nasl,
scripts/ubuntu_843_1.nasl,
scripts/glsa_200502_15.nasl,
scripts/gb_mandriva_MDVA_2008_028.nasl,
scripts/gb_mandriva_MDVA_2008_084.nasl,
scripts/freebsd_proftpd1.nasl,
scripts/gb_CESA-2010_0360_wireshark_centos3_i386.nasl,
scripts/php_nuke_bb_smilies_passwd.nasl,
scripts/glsa_200612_06.nasl,
scripts/sles9p5015295.nasl,
scripts/gb_ubuntu_USN_609_1.nasl,
scripts/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl,
scripts/fcore_2009_3794.nasl,
scripts/deb_1465_2.nasl,
scripts/freebsd_kdebase0.nasl,
scripts/secpod_hyleos_chemview_detect.nasl,
scripts/gb_fedora_2007_709_php_fc6.nasl,
scripts/mdksa_2009_109.nasl,
scripts/gb_fedora_2010_16600_cvs_fc13.nasl,
scripts/gb_ubuntu_USN_648_1.nasl,
scripts/glsa_201001_03.nasl,
scripts/nginx_36438.nasl,
scripts/gb_ubuntu_USN_1205_1.nasl,
scripts/deb_790_1.nasl,
scripts/gb_CESA-2008_0287_libxslt_centos3_i386.nasl,
scripts/sles9p5040200.nasl,
scripts/deb_1878_1.nasl,
scripts/secpod_ms10-082.nasl,
scripts/gb_mandriva_MDVSA_2011_054.nasl,
scripts/fcore_2009_3280.nasl,
scripts/freebsd_rxvt-unicode.nasl,
scripts/gb_mandriva_MDVSA_2008_140.nasl,
scripts/gb_fedora_2008_4990_evolution_fc9.nasl,
scripts/RHSA_2009_1211.nasl,
scripts/gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl,
scripts/gb_CESA-2008_0206_cups_centos4_x86_64.nasl,
scripts/deb_1146_1.nasl,
scripts/gb_fedora_2011_12145_qt_fc14.nasl,
scripts/gb_fedora_2007_413_ImageMagick_fc6.nasl,
scripts/gb_CESA-2010_0585_lftp_centos5_i386.nasl,
scripts/freebsd_cyrus-imapd.nasl,
scripts/secpod_ms11-017.nasl,
scripts/gb_fedora_2010_1936_pcmanx-gtk2_fc11.nasl,
scripts/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl,
scripts/gb_php_detect.nasl,
scripts/gb_seamonkey_mult_vuln_nov09_lin.nasl,
scripts/sles9p5060942.nasl,
scripts/glsa_200511_11.nasl,
scripts/gb_ibm_websphere_44862.nasl,
scripts/gb_ubuntu_USN_616_1.nasl,
scripts/mambo_detect.nasl,
scripts/gb_fedora_2008_7104_poppler_fc8.nasl,
scripts/gb_clamav_43555.nasl,
scripts/aas_detect.nasl,
scripts/gb_fedora_2008_8678_mediawiki_fc8.nasl,
scripts/freebsd_mediawiki4.nasl,
scripts/gb_netrisk_sec_bypass_vuln.nasl,
scripts/deb_192_2.nasl,
scripts/freebsd_roundcube.nasl,
scripts/fcore_2009_13250.nasl,
scripts/secpod_wordpress_detect_900182.nasl,
scripts/secpod_php_address_book_sql_inj_vuln.nasl,
scripts/gb_vtiger_crm_47263.nasl,
scripts/gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl,
scripts/gb_LightOpenCMS_35497.nasl,
scripts/gb_fedora_2011_0208_evince_fc14.nasl,
scripts/glsa_200606_19.nasl,
scripts/mdksa_2009_123.nasl,
scripts/gb_fedora_2008_11598_google-gadgets_fc9.nasl,
scripts/deb_615_1.nasl,
scripts/gb_mandriva_MDKSA_2007_042.nasl,
scripts/gb_phpbb_45005.nasl,
scripts/freebsd_phpbb6.nasl,
scripts/gb_abtp_portal_45290.nasl,
scripts/sles9p5009819.nasl,
scripts/deb_1562_1.nasl,
scripts/sles9p5021170.nasl,
scripts/sles10_hplip17.nasl,
scripts/glsa_200503_19.nasl,
scripts/gb_fedora_2010_1936_perl-Gtk2-MozEmbed_fc11.nasl,
scripts/gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl,
scripts/freebsd_kdelibs.nasl,
scripts/deb_1646_2.nasl,
scripts/freebsdsa_ppp.nasl,
scripts/gb_fedora_2007_414_ImageMagick_fc5.nasl,
scripts/gb_fedora_2011_1273_openssl_fc14.nasl,
scripts/gb_RHSA-2010_0019-01_kernel.nasl,
scripts/ubuntu_850_1.nasl,
scripts/gb_vmware_prdts_vix_api_mult_vuln.nasl,
scripts/ubuntu_791_2.nasl,
scripts/freebsd_ghostscript-gnu.nasl,
scripts/glsa_200606_18.nasl,
scripts/mdksa_2009_243_2.nasl,
scripts/gb_fedora_2007_0001_libpng10_fc7.nasl,
scripts/deb_811_1.nasl,
scripts/gb_ubuntu_USN_889_1.nasl,
scripts/gb_CESA-2008_0209_thunderbird_centos4_x86_64.nasl,
scripts/freebsd_gaim15.nasl,
scripts/gb_fedora_2008_11577_moodle_fc9.nasl,
scripts/gb_mandriva_MDVA_2010_168.nasl,
scripts/gb_mandriva_MDKSA_2007_034.nasl,
scripts/gb_ubuntu_USN_1002_2.nasl,
scripts/gb_fedora_2011_11106_xulrunner_fc15.nasl,
scripts/smb_nt_ms02-072.nasl,
scripts/gb_ubuntu_USN_496_2.nasl,
scripts/freebsd_mozilla0.nasl:
Updated script metadata (changes for CR56).



Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/ChangeLog	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,5 +1,309 @@
 2011-11-2  Henri Doreau <henri.doreau at greenbone.net>
 
+	* scripts/wordpress_37005.nasl,
+	scripts/gb_fedora_2010_14633_ghostscript_fc12.nasl,
+	scripts/gb_RHSA-2010_0528-01_avahi.nasl,
+	scripts/deb_1710_1.nasl,
+	scripts/sles10_NetworkManager-.nasl,
+	scripts/gb_fedora_2010_16826_kernel_fc14.nasl,
+	scripts/metacart_sql.nasl,
+	scripts/gb_fedora_2007_3474_tomcat5_fc8.nasl,
+	scripts/gb_fedora_2008_7739_amarok_fc9.nasl,
+	scripts/secpod_mysql_bof_vuln_lin.nasl,
+	scripts/deb_1806_1.nasl,
+	scripts/glsa_200503_01.nasl,
+	scripts/freebsdsa_pf.nasl,
+	scripts/sles10_python.nasl,
+	scripts/deb_2183_1.nasl,
+	scripts/abyss_msdos_dos.nasl,
+	scripts/gb_fedora_2008_0103_wordpress_fc8.nasl,
+	scripts/glsa_200803_07.nasl,
+	scripts/gb_fedora_2008_3251_openoffice.org_fc8.nasl,
+	scripts/deb_2053_1.nasl,
+	scripts/gb_solaris_112797_01.nasl,
+	scripts/gb_fedora_2007_2299_bugzilla_fc7.nasl,
+	scripts/gb_mandriva_MDVA_2008_152.nasl,
+	scripts/deb_1227_1.nasl,
+	scripts/sles11_mozilla-xulrunn0.nasl,
+	scripts/gb_CESA-2008_0208_seamonkey_centos4_i386.nasl,
+	scripts/gb_realplayer_code_exec_vuln_win.nasl,
+	scripts/gb_graphicsmagick_detect_lin.nasl,
+	scripts/ubuntu_754_1.nasl,
+	scripts/gb_fedora_2007_281_firefox_fc5.nasl,
+	scripts/gb_fedora_2010_8547_oxygen-icon-theme_fc11.nasl,
+	scripts/macosx_secupd_2009-005.nasl,
+	scripts/gb_mandriva_MDVSA_2008_230.nasl,
+	scripts/gb_RHSA-2010_0162-01_openssl.nasl,
+	scripts/gb_fedora_2010_19078_mantis_fc14.nasl,
+	scripts/deb_1663_1.nasl,
+	scripts/gb_fedora_2008_10482_wordpress_fc10.nasl,
+	scripts/gb_fedora_2010_12258_php-pear-CAS_fc13.nasl,
+	scripts/xedus_detect.nasl,
+	scripts/RHSA_2009_1548.nasl,
+	scripts/gb_mandriva_MDVSA_2010_026.nasl,
+	scripts/gb_fedora_2011_1263_java-1.6.0-openjdk_fc14.nasl,
+	scripts/glsa_200408_13.nasl,
+	scripts/deb_041_1.nasl,
+	scripts/osticket_setup_php_accessible.nasl,
+	scripts/gb_RHSA-2010_0659-01_httpd.nasl,
+	scripts/gb_fedora_2008_8764_dbus_fc9.nasl,
+	scripts/glsa_200804_30.nasl,
+	scripts/badblue_get_DoS.nasl,
+	scripts/remote-MS04-017.nasl,
+	scripts/gb_mandriva_MDVSA_2008_029.nasl,
+	scripts/gb_CESA-2011_1109_foomatic_centos5_i386.nasl,
+	scripts/RHSA_2009_1674.nasl,
+	scripts/phpgedview_multiple_flaws.nasl,
+	scripts/glsa_200601_10.nasl,
+	scripts/deb_459_1.nasl,
+	scripts/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl,
+	scripts/gb_vtiger_49927.nasl,
+	scripts/mdksa_2009_091.nasl,
+	scripts/writesrv.nasl,
+	scripts/secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl,
+	scripts/glsa_200611_17.nasl,
+	scripts/deb_420_1.nasl,
+	scripts/deb_443_1.nasl,
+	scripts/gb_ubuntu_USN_903_1.nasl,
+	scripts/secpod_opera_mult_vuln_mar09_lin.nasl,
+	scripts/deb_1586_1.nasl,
+	scripts/gb_mandriva_MDKA_2007_112.nasl,
+	scripts/gb_fedora_2008_9712_roundup_fc8.nasl,
+	scripts/glsa_200407_19.nasl,
+	scripts/fcore_2009_6695.nasl,
+	scripts/gb_solaris_138373_02.nasl,
+	scripts/freebsd_isakmpd.nasl,
+	scripts/glsa_200504_05.nasl,
+	scripts/secpod_ms_iis_detect.nasl,
+	scripts/gb_tinybb_45737.nasl,
+	scripts/glsa_201006_20.nasl,
+	scripts/sles9p5019909.nasl,
+	scripts/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl,
+	scripts/gb_suse_2010_058.nasl,
+	scripts/gb_mandriva_MDVA_2008_182.nasl,
+	scripts/freebsd_python.nasl,
+	scripts/deb_990_1.nasl,
+	scripts/gb_mandriva_MDVA_2008_040.nasl,
+	scripts/gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl,
+	scripts/secpod_firefox_code_exec_vuln_jul09_lin.nasl,
+	scripts/gb_fedora_2010_1842_pdfedit_fc11.nasl,
+	scripts/gb_1024_cms_50275.nasl,
+	scripts/fcore_2009_7491.nasl,
+	scripts/deb_292_2.nasl,
+	scripts/secpod_ms09-025.nasl,
+	scripts/gb_fedora_2008_7830_bitlbee_fc9.nasl,
+	scripts/gb_RHSA-2011_0312-01_thunderbird.nasl,
+	scripts/secpod_cybozu_office_xss_vuln.nasl,
+	scripts/gb_CESA-2008_0104_seamonkey_centos3_x86_64.nasl,
+	scripts/gb_CESA-2008_0617_vim-common_centos4_x86_64.nasl,
+	scripts/gb_allocPS_47860.nasl,
+	scripts/deb_636_1.nasl,
+	scripts/glsa_200607_03.nasl,
+	scripts/gb_fedora_2008_4259_gnutls_fc9.nasl,
+	scripts/gb_fedora_2007_4385_xfce-mcs-plugins_fc7.nasl,
+	scripts/gb_CESA-2009_0436_firefox_centos5_i386.nasl,
+	scripts/gb_fedora_2007_718_ruby_fc6.nasl,
+	scripts/freebsd_proftpd5.nasl,
+	scripts/gb_fedora_2010_17035_gnome-xcf-thumbnailer_fc14.nasl,
+	scripts/secpod_sjs_am_n_opensso_unspecified_vuln.nasl,
+	scripts/sles9p5015723.nasl,
+	scripts/gb_solaris_111070_01.nasl,
+	scripts/freebsd_mediawiki0.nasl,
+	scripts/imp_detect.nasl,
+	scripts/deb_247_1.nasl,
+	scripts/glsa_200610_05.nasl,
+	scripts/gb_realplayer_ivr_bof_vuln_win.nasl,
+	scripts/gb_fedora_2010_14730_lib3ds_fc14.nasl,
+	scripts/gb_ubuntu_USN_1141_1.nasl,
+	scripts/gb_realwin_scada_bof_vuln.nasl,
+	scripts/glsa_200707_12.nasl,
+	scripts/glsa_200804_16.nasl,
+	scripts/deb_1470_1.nasl,
+	scripts/gb_joomla_lyftenbloggie_mult_xss_vuln.nasl,
+	scripts/Yap_Blog_remote-file_include.nasl,
+	scripts/sles9p5012017.nasl,
+	scripts/RHSA_2009_1180.nasl,
+	scripts/gb_fedora_2008_1616_openldap_fc7.nasl,
+	scripts/deb_1629_2.nasl,
+	scripts/freebsd_bind0.nasl,
+	scripts/bugbear_b.nasl,
+	scripts/gb_CESA-2008_0153_cups_centos3_x86_64.nasl,
+	scripts/gb_firefox_xul_parsing_dos_vuln_lin.nasl,
+	scripts/glsa_200504_24.nasl,
+	scripts/psychoblogger_sql_injection.nasl,
+	scripts/gb_egroupware_detect.nasl,
+	scripts/deb_1223_1.nasl,
+	scripts/gb_pivotx_mult_xss_vuln.nasl,
+	scripts/sles10_expat.nasl,
+	scripts/gb_solaris_112923_04.nasl,
+	scripts/RHSA_2009_0373.nasl,
+	scripts/gb_symphony_cms_detect.nasl,
+	scripts/gb_collabtive_44050.nasl,
+	scripts/gb_fedora_2008_7395_libxml2_fc9.nasl,
+	scripts/ovcesa2009_0046.nasl,
+	scripts/deb_2126_1.nasl,
+	scripts/freebsd_apache3.nasl,
+	scripts/ubuntu_741_1.nasl,
+	scripts/gb_qtweb_js_n_data_uri_xss_vuln.nasl,
+	scripts/gb_xm_easy_personal_ftp_dos_vuln.nasl,
+	scripts/gb_perl_archive_tar_26355.nasl,
+	scripts/mssql_brute_force.nasl,
+	scripts/gb_fedora_2011_8983_asterisk_fc15.nasl,
+	scripts/freebsd_racoon0.nasl,
+	scripts/fcore_2009_12305.nasl,
+	scripts/gb_ingate_siparator_detect.nasl,
+	scripts/gb_solaris_119255_73.nasl,
+	scripts/fcore_2009_12827.nasl,
+	scripts/ovcesa2009_1504.nasl,
+	scripts/mdksa_2009_324.nasl,
+	scripts/gb_ubuntu_USN_911_1.nasl,
+	scripts/icecast_rbof.nasl,
+	scripts/ubuntu_733_1.nasl,
+	scripts/qmtp_detect.nasl,
+	scripts/gb_ubuntu_USN_1242_1.nasl,
+	scripts/deb_1444_1.nasl,
+	scripts/secpod_xtreamerpro_media_server_dir_trav_vuln.nasl,
+	scripts/gb_snortreport_detect.nasl,
+	scripts/gb_wireshark_lua_script_code_exec_vuln_win.nasl,
+	scripts/deb_1022_1.nasl,
+	scripts/gb_sigplus_pro_activex_detect.nasl,
+	scripts/gb_mandriva_MDVSA_2010_109.nasl,
+	scripts/gb_fedora_2010_14525_libglpng_fc12.nasl,
+	scripts/sles9p5015928.nasl,
+	scripts/gb_solaris_138876_01.nasl,
+	scripts/iWeb_37228.nasl,
+	scripts/deb_1341_1.nasl,
+	scripts/secpod_firefox_mult_vuln_dec09_win01.nasl,
+	scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl,
+	scripts/secpod_mahara_xss_n_csrf_vuln.nasl,
+	scripts/RHSA_2009_0021.nasl,
+	scripts/freebsd_linux_base.nasl,
+	scripts/gb_apple_safari_cfnetwork_background_dos_vuln.nasl,
+	scripts/freebsd_zhcon.nasl,
+	scripts/gb_bugzilla_41397.nasl,
+	scripts/fcore_2009_1699.nasl,
+	scripts/gb_google_chrome_mult_vuln_mar11_win.nasl,
+	scripts/deb_742_1.nasl,
+	scripts/freebsd_linux-flashplugin.nasl,
+	scripts/gb_ms_ie_xml_doc_dos_vuln_aug09.nasl,
+	scripts/gb_mandriva_MDVA_2008_188.nasl,
+	scripts/deb_1084_1.nasl,
+	scripts/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl,
+	scripts/netop_detect_udp.nasl,
+	scripts/gb_fedora_2011_12485_zabbix_fc15.nasl,
+	scripts/freebsdsa_cvs2.nasl,
+	scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl,
+	scripts/deb_871_1.nasl,
+	scripts/glsa_200604_15.nasl,
+	scripts/ubuntu_843_1.nasl,
+	scripts/glsa_200502_15.nasl,
+	scripts/gb_mandriva_MDVA_2008_028.nasl,
+	scripts/gb_mandriva_MDVA_2008_084.nasl,
+	scripts/freebsd_proftpd1.nasl,
+	scripts/gb_CESA-2010_0360_wireshark_centos3_i386.nasl,
+	scripts/php_nuke_bb_smilies_passwd.nasl,
+	scripts/glsa_200612_06.nasl,
+	scripts/sles9p5015295.nasl,
+	scripts/gb_ubuntu_USN_609_1.nasl,
+	scripts/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl,
+	scripts/fcore_2009_3794.nasl,
+	scripts/deb_1465_2.nasl,
+	scripts/freebsd_kdebase0.nasl,
+	scripts/secpod_hyleos_chemview_detect.nasl,
+	scripts/gb_fedora_2007_709_php_fc6.nasl,
+	scripts/mdksa_2009_109.nasl,
+	scripts/gb_fedora_2010_16600_cvs_fc13.nasl,
+	scripts/gb_ubuntu_USN_648_1.nasl,
+	scripts/glsa_201001_03.nasl,
+	scripts/nginx_36438.nasl,
+	scripts/gb_ubuntu_USN_1205_1.nasl,
+	scripts/deb_790_1.nasl,
+	scripts/gb_CESA-2008_0287_libxslt_centos3_i386.nasl,
+	scripts/sles9p5040200.nasl,
+	scripts/deb_1878_1.nasl,
+	scripts/secpod_ms10-082.nasl,
+	scripts/gb_mandriva_MDVSA_2011_054.nasl,
+	scripts/fcore_2009_3280.nasl,
+	scripts/freebsd_rxvt-unicode.nasl,
+	scripts/gb_mandriva_MDVSA_2008_140.nasl,
+	scripts/gb_fedora_2008_4990_evolution_fc9.nasl,
+	scripts/RHSA_2009_1211.nasl,
+	scripts/gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl,
+	scripts/gb_CESA-2008_0206_cups_centos4_x86_64.nasl,
+	scripts/deb_1146_1.nasl,
+	scripts/gb_fedora_2011_12145_qt_fc14.nasl,
+	scripts/gb_fedora_2007_413_ImageMagick_fc6.nasl,
+	scripts/gb_CESA-2010_0585_lftp_centos5_i386.nasl,
+	scripts/freebsd_cyrus-imapd.nasl,
+	scripts/secpod_ms11-017.nasl,
+	scripts/gb_fedora_2010_1936_pcmanx-gtk2_fc11.nasl,
+	scripts/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl,
+	scripts/gb_php_detect.nasl,
+	scripts/gb_seamonkey_mult_vuln_nov09_lin.nasl,
+	scripts/sles9p5060942.nasl,
+	scripts/glsa_200511_11.nasl,
+	scripts/gb_ibm_websphere_44862.nasl,
+	scripts/gb_ubuntu_USN_616_1.nasl,
+	scripts/mambo_detect.nasl,
+	scripts/gb_fedora_2008_7104_poppler_fc8.nasl,
+	scripts/gb_clamav_43555.nasl,
+	scripts/aas_detect.nasl,
+	scripts/gb_fedora_2008_8678_mediawiki_fc8.nasl,
+	scripts/freebsd_mediawiki4.nasl,
+	scripts/gb_netrisk_sec_bypass_vuln.nasl,
+	scripts/deb_192_2.nasl,
+	scripts/freebsd_roundcube.nasl,
+	scripts/fcore_2009_13250.nasl,
+	scripts/secpod_wordpress_detect_900182.nasl,
+	scripts/secpod_php_address_book_sql_inj_vuln.nasl,
+	scripts/gb_vtiger_crm_47263.nasl,
+	scripts/gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl,
+	scripts/gb_LightOpenCMS_35497.nasl,
+	scripts/gb_fedora_2011_0208_evince_fc14.nasl,
+	scripts/glsa_200606_19.nasl,
+	scripts/mdksa_2009_123.nasl,
+	scripts/gb_fedora_2008_11598_google-gadgets_fc9.nasl,
+	scripts/deb_615_1.nasl,
+	scripts/gb_mandriva_MDKSA_2007_042.nasl,
+	scripts/gb_phpbb_45005.nasl,
+	scripts/freebsd_phpbb6.nasl,
+	scripts/gb_abtp_portal_45290.nasl,
+	scripts/sles9p5009819.nasl,
+	scripts/deb_1562_1.nasl,
+	scripts/sles9p5021170.nasl,
+	scripts/sles10_hplip17.nasl,
+	scripts/glsa_200503_19.nasl,
+	scripts/gb_fedora_2010_1936_perl-Gtk2-MozEmbed_fc11.nasl,
+	scripts/gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl,
+	scripts/freebsd_kdelibs.nasl,
+	scripts/deb_1646_2.nasl,
+	scripts/freebsdsa_ppp.nasl,
+	scripts/gb_fedora_2007_414_ImageMagick_fc5.nasl,
+	scripts/gb_fedora_2011_1273_openssl_fc14.nasl,
+	scripts/gb_RHSA-2010_0019-01_kernel.nasl,
+	scripts/ubuntu_850_1.nasl,
+	scripts/gb_vmware_prdts_vix_api_mult_vuln.nasl,
+	scripts/ubuntu_791_2.nasl,
+	scripts/freebsd_ghostscript-gnu.nasl,
+	scripts/glsa_200606_18.nasl,
+	scripts/mdksa_2009_243_2.nasl,
+	scripts/gb_fedora_2007_0001_libpng10_fc7.nasl,
+	scripts/deb_811_1.nasl,
+	scripts/gb_ubuntu_USN_889_1.nasl,
+	scripts/gb_CESA-2008_0209_thunderbird_centos4_x86_64.nasl,
+	scripts/freebsd_gaim15.nasl,
+	scripts/gb_fedora_2008_11577_moodle_fc9.nasl,
+	scripts/gb_mandriva_MDVA_2010_168.nasl,
+	scripts/gb_mandriva_MDKSA_2007_034.nasl,
+	scripts/gb_ubuntu_USN_1002_2.nasl,
+	scripts/gb_fedora_2011_11106_xulrunner_fc15.nasl,
+	scripts/smb_nt_ms02-072.nasl,
+	scripts/gb_ubuntu_USN_496_2.nasl,
+	scripts/freebsd_mozilla0.nasl:
+	Updated script metadata (changes for CR56).
+
+2011-11-2  Henri Doreau <henri.doreau at greenbone.net>
+
 	* scripts/gb_fedora_2011_5200_exiv2_fc14.nasl,
 	scripts/gb_nostromo_nhttpd_web_server_dir_trav_vuln.nasl,
 	scripts/gb_solaris_119439_15.nasl,

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0021.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(63433);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)");
  script_cve_id("CVE-2008-5029", "CVE-2008-5079", "CVE-2008-5182", "CVE-2008-5300");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
@@ -79,10 +81,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-0021.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:0021";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0373.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0373.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0373.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(63643);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-31 19:20:21 +0200 (Tue, 31 Mar 2009)");
  script_cve_id("CVE-2009-0784");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
@@ -64,10 +66,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-0373.html
-http://www.redhat.com/security/updates/classification/#moderate
+http://www.redhat.com/security/updates/classification/#moderate";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:0373";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1180.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1180.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1180.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(64506);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-0696");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -71,10 +73,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1180.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1180");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1211.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1211.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1211.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(64599);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-1389", "CVE-2009-1439", "CVE-2009-1633");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -50,10 +52,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1211.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1211");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1548.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(66176);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_cve_id("CVE-2009-2695", "CVE-2009-2908", "CVE-2009-3228", "CVE-2009-3286", "CVE-2009-3547", "CVE-2009-3613");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -51,10 +53,8 @@
 
 http://rhn.redhat.com/errata/RHSA-2009-1548.html
 http://www.redhat.com/security/updates/classification/#important
-http://kbase.redhat.com/faq/docs/DOC-18042
+http://kbase.redhat.com/faq/docs/DOC-18042";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1548");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(66537);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)");
  script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -77,10 +79,8 @@
 
 http://rhn.redhat.com/errata/RHSA-2009-1674.html
 http://www.redhat.com/security/updates/classification/#critical
-http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.16
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.16";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1674");

Modified: trunk/openvas-plugins/scripts/Yap_Blog_remote-file_include.nasl
===================================================================
--- trunk/openvas-plugins/scripts/Yap_Blog_remote-file_include.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/Yap_Blog_remote-file_include.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(100046);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-16 12:53:50 +0100 (Mon, 16 Mar 2009)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2008-1370");
  script_bugtraq_id(28120);
@@ -47,10 +49,8 @@
   Versions prior to Yap Blog 1.1.1 are vulnerable. 
 
  See also:
-  http://www.securityfocus.com/bid/28120
+  http://www.securityfocus.com/bid/28120";
 
- Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if Yap Blog is vulnerable to Remote File Include");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/aas_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/aas_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/aas_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -33,14 +33,14 @@
   over LAN and WANs. 
 
  See also:
-  http://www.klinzmann.name/a-a-s/index_en.html
+  http://www.klinzmann.name/a-a-s/index_en.html";
 
- Risk factor : None";
-
 if (description)
 {
  script_id(100196);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-12 22:04:51 +0200 (Tue, 12 May 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("A A S Application Access Server  Server Detection");  

Modified: trunk/openvas-plugins/scripts/abyss_msdos_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/abyss_msdos_dos.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/abyss_msdos_dos.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(15563);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_xref(name:"OSVDB", value:"11006");
  script_tag(name:"risk_factor", value:"High");
  name = "Abyss httpd DoS";
@@ -41,8 +43,7 @@
 An attacker may use this flaw to prevent this host from performing its 
 job properly.
 
-Solution : Upgrade your web server to the latest version
-Risk factor : High";
+Solution : Upgrade your web server to the latest version";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/badblue_get_DoS.nasl
===================================================================
--- trunk/openvas-plugins/scripts/badblue_get_DoS.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/badblue_get_DoS.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -31,6 +31,8 @@
 {
  script_id(11062);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(5187);
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -44,10 +46,8 @@
 A cracker may exploit this vulnerability to make your web server
 crash continually.
 
-Workaround : upgrade your software or protect it with a filtering reverse proxy
+Workaround : upgrade your software or protect it with a filtering reverse proxy";
 
-Risk factor: Medium";
-
  script_description(desc);
  
  summary = "Invalid GET kills the BadBlue web server";

Modified: trunk/openvas-plugins/scripts/bugbear_b.nasl
===================================================================
--- trunk/openvas-plugins/scripts/bugbear_b.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/bugbear_b.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,6 +30,8 @@
 {
  script_id(11707);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("Bugbear.B web backdoor");
@@ -41,10 +43,8 @@
 
 Solution: Use your favorite antivirus to disinfect your
 system. Standalone disinfection tools also exist :
-ftp://ftp.f-secure.com/anti-virus/tools/f-bugbr.zip
+ftp://ftp.f-secure.com/anti-virus/tools/f-bugbr.zip";
 
-Risk factor : High";
-
  script_description(desc);
  script_summary("Checks for Bugbear.B web backdoor");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/deb_041_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_041_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_041_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53802);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 041-1 (joe)";
  script_name(name);
@@ -47,10 +49,8 @@
 you upgrade your joe package immediately.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20041-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20041-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 041-1 (joe)";

Modified: trunk/openvas-plugins/scripts/deb_1022_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1022_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1022_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(56528);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-3146", "CVE-2005-3147", "CVE-2005-3148");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
@@ -67,10 +69,8 @@
 We recommend that you upgrade your storebackup package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201022-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201022-1";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1022-1 (storebackup)";

Modified: trunk/openvas-plugins/scripts/deb_1084_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1084_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1084_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(56854);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-1515");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your typespeed packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201084-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201084-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1084-1 (typespeed)";

Modified: trunk/openvas-plugins/scripts/deb_1146_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1146_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1146_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(57263);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-3083", "CVE-2006-3084");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your krb5 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201146-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201146-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1146-1 (krb5)";

Modified: trunk/openvas-plugins/scripts/deb_1223_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1223_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1223_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(57685);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:17:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-6097");
  script_bugtraq_id(21235);
  script_tag(name:"cvss_base", value:"4.0");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your tar package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201223-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201223-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1223-1 (tar)";

Modified: trunk/openvas-plugins/scripts/deb_1227_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1227_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1227_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(57691);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:17:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-4310", "CVE-2006-5462", "CVE-2006-5463", "CVE-2006-5464", "CVE-2006-5748");
  script_bugtraq_id(19678,20957);
  script_tag(name:"cvss_base", value:"7.5");
@@ -83,10 +85,8 @@
 We recommend that you upgrade your mozilla-thunderbird package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201227-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201227-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1227-1 (mozilla-thunderbird)";

Modified: trunk/openvas-plugins/scripts/deb_1341_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1341_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1341_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(58473);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-2926");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your BIND packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201341-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201341-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1341-1 (bind9)";

Modified: trunk/openvas-plugins/scripts/deb_1444_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1444_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1444_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(60099);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-3799", "CVE-2007-3998", "CVE-2007-4657", "CVE-2007-4658", "CVE-2007-4659", "CVE-2007-4660", "CVE-2007-4662", "CVE-2007-5898", "CVE-2007-5899");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -99,10 +101,8 @@
 We recommend that you upgrade your php5 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201444-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201444-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1444-1 (php5)";

Modified: trunk/openvas-plugins/scripts/deb_1465_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1465_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1465_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(60209);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-31 16:11:48 +0100 (Thu, 31 Jan 2008)");
  script_cve_id("CVE-2008-0302");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
@@ -57,10 +59,8 @@
 We recommend that you upgrade your apt-listchanges package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201465-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201465-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1465-2 (apt-listchanges)";

Modified: trunk/openvas-plugins/scripts/deb_1470_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1470_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1470_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(60213);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-31 16:11:48 +0100 (Thu, 31 Jan 2008)");
  script_cve_id("CVE-2007-6018");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
@@ -55,10 +57,8 @@
 We recommend that you upgrade your horde3 package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201470-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201470-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1470-1 (horde3)";

Modified: trunk/openvas-plugins/scripts/deb_1562_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1562_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1562_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(60867);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-04-30 19:28:13 +0200 (Wed, 30 Apr 2008)");
  script_cve_id("CVE-2008-1380");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -50,10 +52,8 @@
 We recommend that you upgrade your iceape packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201562-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201562-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1562-1 (iceape)";

Modified: trunk/openvas-plugins/scripts/deb_1586_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1586_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1586_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(61038);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-05-27 15:41:50 +0200 (Tue, 27 May 2008)");
  script_cve_id("CVE-2008-1482", "CVE-2008-1686", "CVE-2008-1878");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -72,10 +74,8 @@
 We recommend that you upgrade your xine-lib packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201586-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201586-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1586-1 (xine-lib)";

Modified: trunk/openvas-plugins/scripts/deb_1629_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1629_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1629_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(61435);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 17:00:42 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2008-2936");
  script_tag(name:"cvss_base", value:"6.2");
  script_tag(name:"risk_factor", value:"High");
@@ -71,10 +73,8 @@
 We recommend that you upgrade your postfix package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201629-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201629-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1629-2 (postfix)";

Modified: trunk/openvas-plugins/scripts/deb_1646_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1646_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1646_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(61771);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-11-01 01:55:10 +0100 (Sat, 01 Nov 2008)");
  script_cve_id("CVE-2008-1612", "CVE-2007-6239");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -56,10 +58,8 @@
 We recommend that you upgrade your squid packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201646-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201646-2";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1646-2 (squid)";

Modified: trunk/openvas-plugins/scripts/deb_1663_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1663_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1663_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,6 +28,8 @@
 {
  script_id(61853);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-11-19 16:52:57 +0100 (Wed, 19 Nov 2008)");
  script_cve_id("CVE-2008-0960", "CVE-2008-2292", "CVE-2008-4309");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -70,10 +72,8 @@
 We recommend that you upgrade your net-snmp package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201663-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201663-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1663-1 (net-snmp)";

Modified: trunk/openvas-plugins/scripts/deb_1710_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1710_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1710_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(63296);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-02 23:28:24 +0100 (Mon, 02 Feb 2009)");
  script_cve_id("CVE-2009-0241");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -54,10 +56,8 @@
 We recommend that you upgrade your ganglia-monitor-core packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201710-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201710-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1710-1 (ganglia-monitor-core)";

Modified: trunk/openvas-plugins/scripts/deb_1806_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1806_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1806_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(64039);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-25 20:59:33 +0200 (Mon, 25 May 2009)");
  script_cve_id("CVE-2009-0148");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -55,10 +57,8 @@
 We recommend that you upgrade your cscope package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201806-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201806-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1806-1 (cscope)";

Modified: trunk/openvas-plugins/scripts/deb_1878_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1878_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_1878_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(64821);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-09 02:15:49 +0200 (Wed, 09 Sep 2009)");
  script_cve_id("CVE-2009-2946");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -57,10 +59,8 @@
 We recommend that you upgrade your devscripts package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201878-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201878-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1878-1 (devscripts)");

Modified: trunk/openvas-plugins/scripts/deb_192_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_192_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_192_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53449);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 192-2 (html2ps)";
  script_name(name);
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20192-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20192-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 192-2 (html2ps)";

Modified: trunk/openvas-plugins/scripts/deb_2053_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2053_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_2053_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(67406);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-06-03 22:55:24 +0200 (Thu, 03 Jun 2010)");
  script_tag(name:"cvss_base", value:"7.8");
  script_cve_id("CVE-2009-4537", "CVE-2010-0727", "CVE-2010-1083", "CVE-2010-1084", "CVE-2010-1086", "CVE-2010-1087", "CVE-2010-1088", "CVE-2010-1162", "CVE-2010-1173", "CVE-2010-1187", "CVE-2010-1437", "CVE-2010-1446", "CVE-2010-1451");
  script_tag(name:"risk_factor", value:"High");
@@ -50,10 +52,8 @@
 We recommend that you upgrade your linux-2.6 and user-mode-linux
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202053-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202053-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2053-1 (linux-2.6)");

Modified: trunk/openvas-plugins/scripts/deb_2126_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2126_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_2126_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(68662);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)");
  script_tag(name:"cvss_base", value:"8.3");
  script_cve_id("CVE-2010-2963", "CVE-2010-3067", "CVE-2010-3296", "CVE-2010-3297", "CVE-2010-3310", "CVE-2010-3432", "CVE-2010-3437", "CVE-2010-3442", "CVE-2010-3448", "CVE-2010-3477", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-3849", "CVE-2010-3850", "CVE-2010-3858", "CVE-2010-3859", "CVE-2010-3873", "CVE-2010-3874", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3877", "CVE-2010-3880", "CVE-2010-4072", "CVE-2010-4073", "CVE-2010-4074", "CVE-2010-4078", "CVE-2010-4079", "CVE-2010-4080", "CVE-2010-4081", "CVE-2010-4083", "CVE-2010-4164");
  script_tag(name:"risk_factor", value:"Critical");
@@ -46,10 +48,8 @@
 We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202126-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202126-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2126-1 (linux-2.6)");

Modified: trunk/openvas-plugins/scripts/deb_2183_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2183_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_2183_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(69118);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2011-0530", "CVE-2005-3534");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 
 We recommend that you upgrade your nbd packages.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202183-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202183-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2183-1 (nbd)");

Modified: trunk/openvas-plugins/scripts/deb_247_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_247_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_247_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53589);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(6738);
  script_cve_id("CVE-2003-0040");
  script_tag(name:"cvss_base", value:"7.5");
@@ -56,10 +58,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20247-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20247-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 247-1 (courier)";

Modified: trunk/openvas-plugins/scripts/deb_292_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_292_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_292_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53364);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 292-2 (mime-support)";
  script_name(name);
@@ -59,10 +61,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20292-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20292-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 292-2 (mime-support)";

Modified: trunk/openvas-plugins/scripts/deb_420_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_420_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_420_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53120);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(9397);
  script_cve_id("CVE-2004-0028");
  script_tag(name:"cvss_base", value:"7.5");
@@ -55,10 +57,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20420-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20420-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 420-1 (jitterbug)";

Modified: trunk/openvas-plugins/scripts/deb_443_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_443_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_443_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53680);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-0690", "CVE-2004-0083", "CVE-2004-0084", "CVE-2004-0106", "CVE-2004-0093", "CVE-2004-0094");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -85,10 +87,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20443-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20443-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 443-1 (xfree86)";

Modified: trunk/openvas-plugins/scripts/deb_459_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_459_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_459_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53157);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-0592");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -55,10 +57,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20459-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20459-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 459-1 (kdelibs, kdelibs-crypto)";

Modified: trunk/openvas-plugins/scripts/deb_615_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_615_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_615_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53299);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(12078);
  script_cve_id("CVE-2004-1179");
  script_tag(name:"cvss_base", value:"2.1");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20615-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20615-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 615-1 (debmake)";

Modified: trunk/openvas-plugins/scripts/deb_636_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_636_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_636_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(53743);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0968");
  script_bugtraq_id(11286);
  script_tag(name:"cvss_base", value:"2.1");
@@ -54,10 +56,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20636-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20636-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 636-1 (glibc)";

Modified: trunk/openvas-plugins/scripts/deb_742_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_742_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_742_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(54192);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(13217);
  script_cve_id("CVE-2005-0753");
  script_tag(name:"cvss_base", value:"7.5");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your cvs package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20742-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20742-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 742-1 (cvs)";

Modified: trunk/openvas-plugins/scripts/deb_790_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_790_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_790_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(55192);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-2654");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your phpldapadmin package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20790-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20790-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 790-1 (phpldapadmin)";

Modified: trunk/openvas-plugins/scripts/deb_811_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_811_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_811_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(55345);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(14829);
  script_cve_id("CVE-2005-2657");
  script_tag(name:"cvss_base", value:"4.6");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your common-lisp-controller package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20811-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20811-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 811-1 (common-lisp-controller)";

Modified: trunk/openvas-plugins/scripts/deb_871_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_871_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_871_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(55728);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(15200);
  script_cve_id("CVE-2005-2958");
  script_tag(name:"cvss_base", value:"7.5");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your libgda2 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20871-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20871-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 871-1 (libgda2)";

Modified: trunk/openvas-plugins/scripts/deb_990_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_990_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/deb_990_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(56396);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-0670");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your bluez-hcidump package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20990-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20990-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 990-1 (bluez-hcidump)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_12305.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12305.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_12305.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(66562);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)");
  script_cve_id("CVE-2009-3555");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12305
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12305";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-12305 (tomcat-native)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_12827.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12827.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_12827.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(66512);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-14 23:06:43 +0100 (Mon, 14 Dec 2009)");
  script_cve_id("CVE-2009-3585", "CVE-2009-4151");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
@@ -56,10 +58,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12827
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12827";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-12827 (rt3)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_13250.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13250.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_13250.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(66583);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)");
  script_cve_id("CVE-2009-3555");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
@@ -71,10 +73,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13250
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13250";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 12 FEDORA-2009-13250 (proftpd)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_1699.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1699.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_1699.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(63405);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-18 23:13:28 +0100 (Wed, 18 Feb 2009)");
  script_cve_id("CVE-2009-0499", "CVE-2008-5153", "CVE-2008-4796", "CVE-2009-0502", "CVE-2009-0500", "CVE-2009-0501");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -71,10 +73,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1699
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1699";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-1699 (moodle)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_3280.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3280.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_3280.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(63726);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-06 20:58:11 +0200 (Mon, 06 Apr 2009)");
  script_cve_id("CVE-2009-1171", "CVE-2009-0499", "CVE-2008-5153", "CVE-2008-4796");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -82,10 +84,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3280
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3280";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-3280 (moodle)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_3794.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3794.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_3794.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(63878);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-28 20:40:12 +0200 (Tue, 28 Apr 2009)");
  script_cve_id("CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -79,10 +81,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3794
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3794";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-3794 (xpdf)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_6695.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6695.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_6695.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(64245);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-23 15:49:15 +0200 (Tue, 23 Jun 2009)");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 11 FEDORA-2009-6695 (pcsc-lite)";
  script_name(name);
@@ -57,10 +59,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6695
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6695";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 11 FEDORA-2009-6695 (pcsc-lite)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_7491.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_7491.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/fcore_2009_7491.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(64858);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-15 22:46:32 +0200 (Tue, 15 Sep 2009)");
  script_cve_id("CVE-2009-2295");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -55,10 +57,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7491
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7491";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-7491 (ocaml-camlimages)");

Modified: trunk/openvas-plugins/scripts/freebsd_apache3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apache3.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_apache3.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52388);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0786");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://httpd.apache.org
-http://www.vuxml.org/freebsd/762d1c6d-0722-11d9-b45d-000c41e2cdad.html
+http://www.vuxml.org/freebsd/762d1c6d-0722-11d9-b45d-000c41e2cdad.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: apache";

Modified: trunk/openvas-plugins/scripts/freebsd_bind0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bind0.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_bind0.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(55221);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12364);
  script_cve_id("CVE-2005-0033");
  script_tag(name:"cvss_base", value:"5.0");
@@ -53,10 +55,8 @@
 
 http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html?lang=en
 http://www.isc.org/sw/bind/bind-security.php
-http://www.vuxml.org/freebsd/947f4b14-1c89-11da-bc01-000e0c2e438a.html
+http://www.vuxml.org/freebsd/947f4b14-1c89-11da-bc01-000e0c2e438a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: bind";

Modified: trunk/openvas-plugins/scripts/freebsd_cyrus-imapd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cyrus-imapd.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_cyrus-imapd.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52172);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0546");
  script_bugtraq_id(12636);
  script_tag(name:"cvss_base", value:"7.5");
@@ -53,10 +55,8 @@
 software upgrades.
 
 http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
-http://www.vuxml.org/freebsd/b2d248ad-88f6-11d9-aa18-0001020eed82.html
+http://www.vuxml.org/freebsd/b2d248ad-88f6-11d9-aa18-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: cyrus-imapd";

Modified: trunk/openvas-plugins/scripts/freebsd_gaim15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gaim15.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_gaim15.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(53077);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-1934");
  script_bugtraq_id(13932);
  script_tag(name:"cvss_base", value:"5.0");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://gaim.sourceforge.net/security/index.php?id=19
-http://www.vuxml.org/freebsd/b6612eee-df5f-11d9-b875-0001020eed82.html
+http://www.vuxml.org/freebsd/b6612eee-df5f-11d9-b875-0001020eed82.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: gaim, ja-gaim, ko-gaim, ru-gaim";

Modified: trunk/openvas-plugins/scripts/freebsd_ghostscript-gnu.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ghostscript-gnu.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_ghostscript-gnu.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(55907);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0967");
  script_bugtraq_id(11285);
  script_tag(name:"cvss_base", value:"7.2");
@@ -53,11 +55,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: ghostscript-gnu, ghostscript-gnu-nox11";

Modified: trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_isakmpd.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52399);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0218", "CVE-2004-0219", "CVE-2004-0220", "CVE-2004-0221", "CVE-2004-0222");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -76,10 +78,8 @@
 
 http://www.rapid7.com/advisories/R7-0018.html
 http://www.openbsd.org/errata34.html
-http://www.vuxml.org/freebsd/b7cb488c-8349-11d8-a41f-0020ed76ef5a.html
+http://www.vuxml.org/freebsd/b7cb488c-8349-11d8-a41f-0020ed76ef5a.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: isakmpd";

Modified: trunk/openvas-plugins/scripts/freebsd_kdebase0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_kdebase0.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_kdebase0.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(54372);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(14297);
  script_cve_id("CVE-2005-1920");
  script_tag(name:"cvss_base", value:"5.0");
@@ -47,10 +49,8 @@
 
 https://bugs.kde.org/show_bug.cgi?id=103331
 http://www.kde.org/info/security/advisory-20050718-1.txt
-http://www.vuxml.org/freebsd/2e116ba5-f7c3-11d9-928e-000b5d7e6dd5.html
+http://www.vuxml.org/freebsd/2e116ba5-f7c3-11d9-928e-000b5d7e6dd5.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: kdebase";

Modified: trunk/openvas-plugins/scripts/freebsd_kdelibs.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_kdelibs.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_kdelibs.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52129);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-1046");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -50,10 +52,8 @@
 
 http://bugs.kde.org/102328
 http://www.kde.org/info/security/advisory-20050421-1.txt
-http://www.vuxml.org/freebsd/06404241-b306-11d9-a788-0001020eed82.html
+http://www.vuxml.org/freebsd/06404241-b306-11d9-a788-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: kdelibs";

Modified: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(56390);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(17951, 17106);
  script_cve_id("CVE-2006-0024");
  script_tag(name:"cvss_base", value:"5.1");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html
-http://www.vuxml.org/freebsd/83421018-b3ef-11da-a32d-000c6ec775d9.html
+http://www.vuxml.org/freebsd/83421018-b3ef-11da-a32d-000c6ec775d9.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: linux-flashplugin";

Modified: trunk/openvas-plugins/scripts/freebsd_linux_base.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux_base.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_linux_base.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52995);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2002-0029", "CVE-2004-0083", "CVE-2004-0084", "CVE-2004-0106", "CVE-2004-0687", "CVE-2004-0688", "CVE-2004-0692", "CVE-2004-0914");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -52,10 +54,8 @@
 http://rhn.redhat.com/errata/RHSA-2004-059.html
 http://rhn.redhat.com/errata/RHSA-2004-478.html
 http://rhn.redhat.com/errata/RHSA-2004-612.html
-http://www.vuxml.org/freebsd/bf2e7483-d3fa-440d-8c6e-8f1f2f018818.html
+http://www.vuxml.org/freebsd/bf2e7483-d3fa-440d-8c6e-8f1f2f018818.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: linux_base";

Modified: trunk/openvas-plugins/scripts/freebsd_mediawiki0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mediawiki0.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_mediawiki0.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(56519);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-1498");
  script_bugtraq_id(17269);
  script_tag(name:"cvss_base", value:"4.3");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-March/000040.html
-http://www.vuxml.org/freebsd/74b7403c-c4d5-11da-b2fb-000e0c2e438a.html
+http://www.vuxml.org/freebsd/74b7403c-c4d5-11da-b2fb-000e0c2e438a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mediawiki";

Modified: trunk/openvas-plugins/scripts/freebsd_mediawiki4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mediawiki4.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_mediawiki4.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,6 +30,8 @@
 {
  script_id(67409);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-06-03 22:55:24 +0200 (Thu, 03 Jun 2010)");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: mediawiki");
 
@@ -44,10 +46,8 @@
 
 http://secunia.com/advisories/39922/
 http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html
-http://www.vuxml.org/freebsd/fc55e396-6deb-11df-8b8e-000c29ba66d2.html
+http://www.vuxml.org/freebsd/fc55e396-6deb-11df-8b8e-000c29ba66d2.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: mediawiki");

Modified: trunk/openvas-plugins/scripts/freebsd_mozilla0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mozilla0.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_mozilla0.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52393);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(15495);
  script_cve_id("CVE-2004-0757");
  script_tag(name:"cvss_base", value:"10.0");
@@ -56,10 +58,8 @@
 
 http://bugzilla.mozilla.org/show_bug.cgi?id=229374
 http://bugzilla.mozilla.org/show_bug.cgi?id=157644
-http://www.vuxml.org/freebsd/c1d97a8b-05ed-11d9-b45d-000c41e2cdad.html
+http://www.vuxml.org/freebsd/c1d97a8b-05ed-11d9-b45d-000c41e2cdad.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mozilla";

Modified: trunk/openvas-plugins/scripts/freebsd_phpbb6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpbb6.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_phpbb6.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52540);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-1315");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -56,10 +58,8 @@
 http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=240636
 http://marc.theaimsgroup.com/?l=bugtraq&m=110029415208724
 http://marc.theaimsgroup.com/?l=bugtraq&m=110079436714518
-http://www.vuxml.org/freebsd/e3cf89f0-53da-11d9-92b7-ceadd4ac2edd.html
+http://www.vuxml.org/freebsd/e3cf89f0-53da-11d9-92b7-ceadd4ac2edd.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: phpbb";

Modified: trunk/openvas-plugins/scripts/freebsd_proftpd1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_proftpd1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_proftpd1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(54483);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(14381, 14380);
  script_cve_id("CVE-2005-2390");
  script_tag(name:"cvss_base", value:"6.4");
@@ -55,10 +57,8 @@
 
 http://www.gentoo.org/security/en/glsa/glsa-200508-02.xml
 http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2
-http://www.vuxml.org/freebsd/c28f4705-043f-11da-bc08-0001020eed82.html
+http://www.vuxml.org/freebsd/c28f4705-043f-11da-bc08-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: proftpd, proftpd-mysql";

Modified: trunk/openvas-plugins/scripts/freebsd_proftpd5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_proftpd5.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_proftpd5.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,6 +30,8 @@
 {
  script_id(63630);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)");
  script_cve_id("CVE-2009-0542", "CVE-2009-0543");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -63,10 +65,8 @@
 http://bugs.proftpd.org/show_bug.cgi?id=3173
 http://bugs.proftpd.org/show_bug.cgi?id=3124
 http://milw0rm.com/exploits/8037
-http://www.vuxml.org/freebsd/ca0841ff-1254-11de-a964-0030843d3802.html
+http://www.vuxml.org/freebsd/ca0841ff-1254-11de-a964-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: proftpd, proftpd-mysql";

Modified: trunk/openvas-plugins/scripts/freebsd_python.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_python.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_python.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52197);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12437);
  script_cve_id("CVE-2005-0089");
  script_tag(name:"cvss_base", value:"7.5");
@@ -57,10 +59,8 @@
 software upgrades.
 
 http://www.python.org/security/PSF-2005-001/
-http://www.vuxml.org/freebsd/6afa87d3-764b-11d9-b0e7-0000e249a0a2.html
+http://www.vuxml.org/freebsd/6afa87d3-764b-11d9-b0e7-0000e249a0a2.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: python, python23, python22, python-devel";

Modified: trunk/openvas-plugins/scripts/freebsd_racoon0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_racoon0.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_racoon0.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52481);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(10172);
  script_cve_id("CVE-2004-0403");
  script_tag(name:"cvss_base", value:"5.0");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/racoon/isakmp.c.diff?r1=1.180&r2=1.181
-http://www.vuxml.org/freebsd/ccd698df-8e20-11d8-90d1-0020ed76ef5a.html
+http://www.vuxml.org/freebsd/ccd698df-8e20-11d8-90d1-0020ed76ef5a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: racoon";

Modified: trunk/openvas-plugins/scripts/freebsd_roundcube.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_roundcube.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_roundcube.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,6 +30,8 @@
 {
  script_id(63094);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-02 18:22:54 +0100 (Fri, 02 Jan 2009)");
  script_cve_id("CVE-2008-5619");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://trac.roundcube.net/ticket/1485618
-http://www.vuxml.org/freebsd/8f483746-d45d-11dd-84ec-001fc66e7203.html
+http://www.vuxml.org/freebsd/8f483746-d45d-11dd-84ec-001fc66e7203.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: roundcube";

Modified: trunk/openvas-plugins/scripts/freebsd_rxvt-unicode.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_rxvt-unicode.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_rxvt-unicode.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52159);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12807);
  script_cve_id("CVE-2005-0764");
  script_tag(name:"cvss_base", value:"7.5");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://dist.schmorp.de/rxvt-unicode/Changes
-http://www.vuxml.org/freebsd/d4bd4046-93a6-11d9-8378-000bdb1444a4.html
+http://www.vuxml.org/freebsd/d4bd4046-93a6-11d9-8378-000bdb1444a4.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: rxvt-unicode";

Modified: trunk/openvas-plugins/scripts/freebsd_zhcon.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_zhcon.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsd_zhcon.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,6 +29,8 @@
 {
  script_id(52205);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12343);
  script_cve_id("CVE-2005-0072");
  script_tag(name:"cvss_base", value:"2.1");
@@ -49,11 +51,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: zhcon, zh-zhcon";

Modified: trunk/openvas-plugins/scripts/freebsdsa_cvs2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_cvs2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsdsa_cvs2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -31,6 +31,8 @@
 {
  script_id(52656);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0414", "CVE-2004-0778");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -76,8 +78,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-04:14.cvs.asc
-Risk factor: Critical";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-04:14.cvs.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_pf.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_pf.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsdsa_pf.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -31,6 +31,8 @@
 {
  script_id(56202);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(16375);
  script_cve_id("CVE-2006-0381");
  script_tag(name:"cvss_base", value:"5.0");
@@ -52,8 +54,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:07.pf.asc
-Risk factor: Medium";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:07.pf.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_ppp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_ppp.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/freebsdsa_ppp.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -31,6 +31,8 @@
 {
  script_id(57294);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-4304");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -52,8 +54,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:18.ppp.asc
-Risk factor: Critical";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:18.ppp.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/gb_1024_cms_50275.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_1024_cms_50275.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_1024_cms_50275.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103307);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-10-20 15:15:44 +0200 (Thu, 20 Oct 2011)");
  script_bugtraq_id(50275);
- script_version ("$Revision$");
 
  script_name("1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_1024_cms_50275.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0104_seamonkey_centos3_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0104_seamonkey_centos3_x86_64.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0104_seamonkey_centos3_x86_64.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880054);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0104");
@@ -73,10 +75,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-February/014662.html
+  http://lists.centos.org/pipermail/centos-announce/2008-February/014662.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0104_seamonkey_centos3_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0153_cups_centos3_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0153_cups_centos3_x86_64.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0153_cups_centos3_x86_64.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880122);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0153");
@@ -70,10 +72,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-February/014709.html
+  http://lists.centos.org/pipermail/centos-announce/2008-February/014709.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of cups");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0153_cups_centos3_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0206_cups_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0206_cups_centos4_x86_64.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0206_cups_centos4_x86_64.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880155);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0206");
@@ -63,10 +65,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-April/014800.html
+  http://lists.centos.org/pipermail/centos-announce/2008-April/014800.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of cups");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0206_cups_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0208_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0208_seamonkey_centos4_i386.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0208_seamonkey_centos4_i386.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880186);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0208");
@@ -58,10 +60,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-March/014788.html
+  http://lists.centos.org/pipermail/centos-announce/2008-March/014788.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0208_seamonkey_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0209_thunderbird_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0209_thunderbird_centos4_x86_64.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0209_thunderbird_centos4_x86_64.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880287);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0209");
@@ -61,10 +63,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-April/014808.html
+  http://lists.centos.org/pipermail/centos-announce/2008-April/014808.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of thunderbird");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0209_thunderbird_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0287_libxslt_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0287_libxslt_centos3_i386.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0287_libxslt_centos3_i386.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880193);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0287");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-May/014920.html
+  http://lists.centos.org/pipermail/centos-announce/2008-May/014920.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libxslt");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0287_libxslt_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880158);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0556");
@@ -60,10 +62,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-June/015001.html
+  http://lists.centos.org/pipermail/centos-announce/2008-June/015001.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of freetype");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0617_vim-common_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0617_vim-common_centos4_x86_64.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0617_vim-common_centos4_x86_64.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880078);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0617");
@@ -67,10 +69,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-November/015457.html
+  http://lists.centos.org/pipermail/centos-announce/2008-November/015457.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of vim-common");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0617_vim-common_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880930);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2009:0398-01");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0436_firefox_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0436_firefox_centos5_i386.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0436_firefox_centos5_i386.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880667);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:0436");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0436_firefox_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos3_i386.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos3_i386.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880393);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-29 13:13:58 +0200 (Thu, 29 Apr 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0360");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0585_lftp_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0585_lftp_centos5_i386.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0585_lftp_centos5_i386.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880589);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2010:0585");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0585_lftp_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1109_foomatic_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1109_foomatic_centos5_i386.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1109_foomatic_centos5_i386.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880991);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:1109");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_1109_foomatic_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_LightOpenCMS_35497.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_LightOpenCMS_35497.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_LightOpenCMS_35497.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100849);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-10-08 13:09:30 +0200 (Fri, 08 Oct 2010)");
  script_bugtraq_id(35497);
  script_tag(name:"cvss_base", value:"9.3");
   script_cve_id("CVE-2009-2223");
- script_version ("1.0-$Revision$");
 
  script_name("LightOpenCMS 'smarty.php' Local File Include Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_LightOpenCMS_35497.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0019-01_kernel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0019-01_kernel.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0019-01_kernel.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870203);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-15 10:29:41 +0100 (Fri, 15 Jan 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0019-01");
@@ -68,10 +70,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2010-January/msg00004.html
+  https://www.redhat.com/archives/rhsa-announce/2010-January/msg00004.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0019-01_kernel.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0162-01_openssl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0162-01_openssl.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0162-01_openssl.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870235);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-31 14:20:46 +0200 (Wed, 31 Mar 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0162-01");
@@ -75,10 +77,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2010-March/msg00020.html
+  https://www.redhat.com/archives/rhsa-announce/2010-March/msg00020.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openssl");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0162-01_openssl.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0528-01_avahi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0528-01_avahi.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0528-01_avahi.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870289);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-16 10:40:49 +0200 (Fri, 16 Jul 2010)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2010:0528-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0528-01_avahi.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0659-01_httpd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0659-01_httpd.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0659-01_httpd.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870314);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-07 07:38:40 +0200 (Tue, 07 Sep 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "RHSA", value: "2010:0659-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0659-01_httpd.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_0312-01_thunderbird.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_0312-01_thunderbird.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_0312-01_thunderbird.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870401);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:0312-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_0312-01_thunderbird.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_abtp_portal_45290.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_abtp_portal_45290.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_abtp_portal_45290.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100942);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-12-09 13:44:03 +0100 (Thu, 09 Dec 2010)");
  script_bugtraq_id(45290);
- script_version ("1.0-$Revision$");
 
  script_name("Abtp Portal Project 'ABTPV_BLOQUE_CENT' Parameter Local and Remote File Include Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_abtp_portal_45290.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl 15767 2011-06-17 16:12:12Z jun $
+# $Id$
 #
 # Adobe Reader and Acrobat Multiple BOF Vulnerabilities June-2011 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802110);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-01 16:09:45 +0200 (Fri, 01 Jul 2011)");
   script_cve_id("CVE-2011-2094", "CVE-2011-2095", "CVE-2011-2096", "CVE-2011-2097",
                 "CVE-2011-2098", "CVE-2011-2099", "CVE-2011-2100", "CVE-2011-2101",
                 "CVE-2011-2104", "CVE-2011-2105", "CVE-2011-2106");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun11_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_allocPS_47860.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_allocPS_47860.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_allocPS_47860.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103168);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-06-03 14:27:02 +0200 (Fri, 03 Jun 2011)");
  script_bugtraq_id(47860);
- script_version ("1.0-$Revision$");
 
  script_name("allocPSA 'login/login.php' Cross Site Scripting Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_allocPS_47860.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apple_safari_cfnetwork_background_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apple_safari_cfnetwork_background_dos_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_apple_safari_cfnetwork_background_dos_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_apple_safari_cfnetwork_background_dos_vuln.nasl 7545 2010-03-04 12:20:26Z mar $
+# $Id$
 #
 # Apple Safari 'background' Remote Denial Of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800485);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-05 10:09:57 +0100 (Fri, 05 Mar 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2010-0924");
@@ -59,8 +61,7 @@
 
   CVSS Score:
     CVSS Base Score      : 5.0 (AV:N/AC:L/Au:NR/C:P/I:N/A:N)
-    CVSS Temporal Score  : 4.5
-  Risk factor : Medium";
+    CVSS Temporal Score  : 4.5";
 
   script_description(desc);
   script_summary("Check for the version of Apple Safari and cfnetwork.dll");


Property changes on: trunk/openvas-plugins/scripts/gb_apple_safari_cfnetwork_background_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl 16587 2011-09-12 22:35:01Z sep $
+# $Id$
 #
 # Atutor AChecker Multiple SQL Injection and XSS Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801982);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-14 16:05:49 +0200 (Wed, 14 Sep 2011)");
   script_bugtraq_id(49061, 49093);
   script_tag(name:"cvss_base", value:"6.5");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_atutor_achecker_mult_sql_inj_n_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_bugzilla_41397.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_bugzilla_41397.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_bugzilla_41397.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100706);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-07 12:47:04 +0200 (Wed, 07 Jul 2010)");
  script_bugtraq_id(41397);
- script_version ("1.0-$Revision$");
 
  script_name("Bugzilla Group Selection During Bug Creation Information Disclosure Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_bugzilla_41397.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_clamav_43555.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_clamav_43555.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_clamav_43555.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100830);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-09-29 12:56:18 +0200 (Wed, 29 Sep 2010)");
  script_bugtraq_id(43555);
  script_tag(name:"cvss_base", value:"9.3");
   script_cve_id("CVE-2010-3434");
- script_version ("1.0-$Revision$");
 
  script_name("ClamAV 'find_stream_bounds()' PDF File Processing Denial Of Service Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_clamav_43555.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_collabtive_44050.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_collabtive_44050.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_collabtive_44050.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100855);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-10-13 18:51:23 +0200 (Wed, 13 Oct 2010)");
  script_bugtraq_id(44050);
- script_version ("1.0-$Revision$");
 
  script_name("Collabtive Cross Site Scripting and HTML Injection Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_collabtive_44050.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_egroupware_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_egroupware_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_egroupware_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -40,7 +40,9 @@
 {
  
  script_id(100823);
- script_version ("Revision: 1.0 $");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-09-24 14:46:08 +0200 (Fri, 24 Sep 2010)");
  script_name("EGroupware Detection");
  script_tag(name:"risk_factor", value:"None");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_egroupware_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_0001_libpng10_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_0001_libpng10_fc7.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_0001_libpng10_fc7.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861550);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-0001");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-May/msg00076.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-May/msg00076.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of libpng10");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_0001_libpng10_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2299_bugzilla_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2299_bugzilla_fc7.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2299_bugzilla_fc7.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861402);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-2299");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00387.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00387.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bugzilla");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2299_bugzilla_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_281_firefox_fc5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_281_firefox_fc5.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_281_firefox_fc5.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861440);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-281");
   script_name( "Fedora Update for firefox FEDORA-2007-281");
@@ -43,10 +45,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-February/msg00146.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-February/msg00146.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of firefox");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_281_firefox_fc5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_3474_tomcat5_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_3474_tomcat5_fc8.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_3474_tomcat5_fc8.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861582);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-3474");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00545.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00545.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of tomcat5");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_3474_tomcat5_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_413_ImageMagick_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_413_ImageMagick_fc6.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_413_ImageMagick_fc6.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861499);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:27:46 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-413");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-April/msg00017.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-April/msg00017.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ImageMagick");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_413_ImageMagick_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_414_ImageMagick_fc5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_414_ImageMagick_fc5.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_414_ImageMagick_fc5.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861508);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:27:46 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-414");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-April/msg00047.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-April/msg00047.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ImageMagick");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_414_ImageMagick_fc5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_4385_xfce-mcs-plugins_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_4385_xfce-mcs-plugins_fc7.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_4385_xfce-mcs-plugins_fc7.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861358);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:27:46 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-4385");
   script_name( "Fedora Update for xfce-mcs-plugins FEDORA-2007-4385");
@@ -43,10 +45,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00522.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00522.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of xfce-mcs-plugins");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_4385_xfce-mcs-plugins_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_709_php_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_709_php_fc6.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_709_php_fc6.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861353);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-709");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of php");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_709_php_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_718_ruby_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_718_ruby_fc6.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_718_ruby_fc6.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861244);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-718");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00087.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00087.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of ruby");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_718_ruby_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_0103_wordpress_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_0103_wordpress_fc8.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_0103_wordpress_fc8.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860813);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-0103");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of wordpress");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_0103_wordpress_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_10482_wordpress_fc10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_10482_wordpress_fc10.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_10482_wordpress_fc10.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860318);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 14:16:57 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-10482");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00083.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00083.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of wordpress");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_10482_wordpress_fc10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_11577_moodle_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_11577_moodle_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_11577_moodle_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860699);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-13 10:35:30 +0100 (Fri, 13 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-11577");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00955.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00955.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of moodle");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_11577_moodle_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_11598_google-gadgets_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_11598_google-gadgets_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_11598_google-gadgets_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860749);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-13 10:35:30 +0100 (Fri, 13 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-11598");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01061.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01061.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of google-gadgets");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_11598_google-gadgets_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_1616_openldap_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_1616_openldap_fc7.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_1616_openldap_fc7.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860783);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 14:16:57 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-1616");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00471.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00471.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of openldap");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_1616_openldap_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_3251_openoffice.org_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_3251_openoffice.org_fc8.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_3251_openoffice.org_fc8.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860280);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 16:43:56 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-3251");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00448.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00448.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_3251_openoffice.org_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_4259_gnutls_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_4259_gnutls_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_4259_gnutls_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860861);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 16:47:15 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-4259");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00590.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of gnutls");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_4259_gnutls_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_4990_evolution_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_4990_evolution_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_4990_evolution_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860878);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 16:47:15 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-4990");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00157.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00157.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of evolution");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_4990_evolution_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_7104_poppler_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_7104_poppler_fc8.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_7104_poppler_fc8.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860449);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:03:12 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-7104");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00161.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00161.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of poppler");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_7104_poppler_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_7395_libxml2_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_7395_libxml2_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_7395_libxml2_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860192);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:03:12 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-7395");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of libxml2");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_7395_libxml2_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_7739_amarok_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_7739_amarok_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_7739_amarok_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860453);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:03:12 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"3.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-7739");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00057.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00057.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of amarok");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_7739_amarok_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_7830_bitlbee_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_7830_bitlbee_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_7830_bitlbee_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860241);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:03:12 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-7830");
   script_name( "Fedora Update for bitlbee FEDORA-2008-7830");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00692.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00692.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bitlbee");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_7830_bitlbee_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8678_mediawiki_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8678_mediawiki_fc8.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8678_mediawiki_fc8.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860897);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-8678");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00220.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00220.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of mediawiki");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8678_mediawiki_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8764_dbus_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8764_dbus_fc9.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8764_dbus_fc9.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860514);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"2.1");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-8764");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of dbus");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8764_dbus_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_9712_roundup_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_9712_roundup_fc8.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_9712_roundup_fc8.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860879);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:07:33 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-9712");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of roundup");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_9712_roundup_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_12258_php-pear-CAS_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_12258_php-pear-CAS_fc13.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_12258_php-pear-CAS_fc13.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862364);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-07 07:38:40 +0200 (Tue, 07 Sep 2010)");
   script_tag(name:"cvss_base", value:"4.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-12258");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_12258_php-pear-CAS_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14525_libglpng_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14525_libglpng_fc12.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14525_libglpng_fc12.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862405);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-14 15:35:55 +0200 (Tue, 14 Sep 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14525");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14525_libglpng_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14633_ghostscript_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14633_ghostscript_fc12.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14633_ghostscript_fc12.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862452);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-19 15:54:15 +0200 (Tue, 19 Oct 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-14633");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14633_ghostscript_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14730_lib3ds_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14730_lib3ds_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14730_lib3ds_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862635);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-14730");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14730_lib3ds_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_16600_cvs_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_16600_cvs_fc13.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_16600_cvs_fc13.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862493);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-16600");
   script_tag(name:"cvss_base", value:"6.9");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_16600_cvs_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_16826_kernel_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_16826_kernel_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_16826_kernel_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(862654);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)");
   script_tag(name:"cvss_base", value:"7.2");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-16826");
   script_cve_id("CVE-2010-2962", "CVE-2010-3698", "CVE-2010-2963", "CVE-2010-3904");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_16826_kernel_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862491);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-16883");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_16883_perl-Gtk2-MozEmbed_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_17035_gnome-xcf-thumbnailer_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_17035_gnome-xcf-thumbnailer_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_17035_gnome-xcf-thumbnailer_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862657);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-17035");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_17035_gnome-xcf-thumbnailer_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1842_pdfedit_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1842_pdfedit_fc11.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1842_pdfedit_fc11.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861624);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-1842");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of pdfedit");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1842_pdfedit_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_19078_mantis_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_19078_mantis_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_19078_mantis_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862757);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-04 09:11:34 +0100 (Tue, 04 Jan 2011)");
   script_tag(name:"cvss_base", value:"5.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-19078");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_19078_mantis_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1936_pcmanx-gtk2_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1936_pcmanx-gtk2_fc11.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1936_pcmanx-gtk2_fc11.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861614);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-1936");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035350.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035350.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of pcmanx-gtk2");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1936_pcmanx-gtk2_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1936_perl-Gtk2-MozEmbed_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1936_perl-Gtk2-MozEmbed_fc11.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1936_perl-Gtk2-MozEmbed_fc11.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861719);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-1936");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035356.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035356.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of perl-Gtk2-MozEmbed");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1936_perl-Gtk2-MozEmbed_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_8547_oxygen-icon-theme_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_8547_oxygen-icon-theme_fc11.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_8547_oxygen-icon-theme_fc11.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862019);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-8547");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_8547_oxygen-icon-theme_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_0208_evince_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_0208_evince_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_0208_evince_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862785);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)");
   script_tag(name:"cvss_base", value:"7.6");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-0208");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_0208_evince_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_11106_xulrunner_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11106_xulrunner_fc15.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11106_xulrunner_fc15.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863424);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-11106");
   script_name("Fedora Update for xulrunner FEDORA-2011-11106");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_11106_xulrunner_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_12145_qt_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12145_qt_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12145_qt_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863543);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-27 17:29:53 +0200 (Tue, 27 Sep 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2011-12145");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_12145_qt_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_12485_zabbix_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12485_zabbix_fc15.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12485_zabbix_fc15.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863526);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-20 15:38:54 +0200 (Tue, 20 Sep 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-12485");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_12485_zabbix_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_1263_java-1.6.0-openjdk_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_1263_java-1.6.0-openjdk_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_1263_java-1.6.0-openjdk_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862848);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-16 14:19:17 +0100 (Wed, 16 Feb 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-1263");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_1263_java-1.6.0-openjdk_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_1273_openssl_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_1273_openssl_fc14.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_1273_openssl_fc14.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862849);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-16 14:19:17 +0100 (Wed, 16 Feb 2011)");
   script_tag(name:"cvss_base", value:"7.6");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-1273");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_1273_openssl_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8983_asterisk_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8983_asterisk_fc15.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8983_asterisk_fc15.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863352);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-18 15:23:56 +0200 (Mon, 18 Jul 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-8983");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8983_asterisk_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_firefox_xul_parsing_dos_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_firefox_xul_parsing_dos_vuln_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_firefox_xul_parsing_dos_vuln_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_firefox_xul_parsing_dos_vuln_lin.nasl 1420 2009-04-06 19:52:20Z apr $
+# $Id$
 #
 # Firefox XUL Parsing Denial of Service Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800390);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-08 08:04:29 +0200 (Wed, 08 Apr 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-1232");
@@ -59,8 +61,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of Firefox");


Property changes on: trunk/openvas-plugins/scripts/gb_firefox_xul_parsing_dos_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_mar11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_mar11_win.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_mar11_win.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_google_chrome_mult_vuln_mar11_win.nasl 14140 2011-03-03 16:16:16 mar $
+# $Id$
 #
 # Google Chrome multiple vulnerabilities - March 11 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801855);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-04 14:32:35 +0100 (Fri, 04 Mar 2011)");
   script_bugtraq_id(46614);
   script_cve_id("CVE-2011-1107", "CVE-2011-1108", "CVE-2011-1109", "CVE-2011-1110",
                 "CVE-2011-1111", "CVE-2011-1112", "CVE-2011-1114", "CVE-2011-1115",


Property changes on: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_mar11_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_graphicsmagick_detect_lin.nasl 1015 2009-02-16 12:21:12Z feb $
+# $Id$
 #
 # GraphicsMagick Version Detection (Linux)
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(800516);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-18 15:32:11 +0100 (Wed, 18 Feb 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("GraphicsMagick Version Detection (Linux)");
   desc = "
 
   Overview: This script detects the installed version of GraphicsMagick
-  and sets the version in KB.
+  and sets the version in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Sets KB for Version of GraphicsMagick");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ibm_websphere_44862.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ibm_websphere_44862.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ibm_websphere_44862.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100904);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-11-16 13:35:09 +0100 (Tue, 16 Nov 2010)");
  script_bugtraq_id(44862);
  script_tag(name:"cvss_base", value:"5.0");
   script_cve_id("CVE-2010-0786");
- script_version ("1.0-$Revision$");
 
  script_name("IBM WebSphere Application Server JAX-WS Denial Of Service Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_ibm_websphere_44862.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -37,7 +37,9 @@
  
  script_tag(name:"risk_factor", value:"None");
  script_id(103206);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-17 15:40:19 +0200 (Wed, 17 Aug 2011)");
 
  script_name("inGate SIParator Detection");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_joomla_lyftenbloggie_mult_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_joomla_lyftenbloggie_mult_xss_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_joomla_lyftenbloggie_mult_xss_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_joomla_lyftenbloggie_mult_xss_vuln.nasl 13541 2011-02-10 11:33:29 feb $
+# $Id$
 #
 # Joomla 'Lyftenbloggie' Component Cross-Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801741);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-15 08:14:35 +0100 (Tue, 15 Feb 2011)");
   script_cve_id("CVE-2010-4718");
   script_bugtraq_id(45468);
   script_tag(name:"cvss_base", value:"4.3");


Property changes on: trunk/openvas-plugins/scripts/gb_joomla_lyftenbloggie_mult_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_112.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_112.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_112.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830170);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:112");
   script_name( "Mandriva Update for python-reportlab MDKA-2007:112 (python-reportlab)");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-11/msg00041.php
+  http://lists.mandriva.com/security-announce/2007-11/msg00041.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of python-reportlab");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_112.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_034.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_034.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_034.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830091);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKSA", value: "2007:034");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-02/msg00003.php
+  http://lists.mandriva.com/security-announce/2007-02/msg00003.php";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of samba");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_034.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_042.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_042.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_042.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830194);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"4.4");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDKSA", value: "2007:042");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-02/msg00012.php
+  http://lists.mandriva.com/security-announce/2007-02/msg00012.php";
 
-  Risk factor : Medium";
-
   script_description(desc);
   script_summary("Check for the Version of smb4k");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_042.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_028.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_028.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_028.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830372);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:028");
   script_name( "Mandriva Update for psad MDVA-2008:028 (psad)");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-02/msg00024.php
+  http://lists.mandriva.com/security-announce/2008-02/msg00024.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of psad");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_028.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_040.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_040.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_040.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830475);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:040");
   script_name( "Mandriva Update for monitor-edid MDVA-2008:040 (monitor-edid)");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-03/msg00023.php
+  http://lists.mandriva.com/security-announce/2008-03/msg00023.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of monitor-edid");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_040.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_084.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_084.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_084.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830411);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:084");
   script_name( "Mandriva Update for udev MDVA-2008:084 (udev)");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-06/msg00005.php
+  http://lists.mandriva.com/security-announce/2008-06/msg00005.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of udev");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_084.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_152.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_152.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_152.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830455);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:09:08 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:152");
   script_name( "Mandriva Update for totem-pl-parser MDVA-2008:152 (totem-pl-parser)");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-10/msg00032.php
+  http://lists.mandriva.com/security-announce/2008-10/msg00032.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of totem-pl-parser");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_152.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_182.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_182.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_182.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830774);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:09:08 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:182");
   script_name( "Mandriva Update for evince MDVA-2008:182 (evince)");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-11/msg00031.php
+  http://lists.mandriva.com/security-announce/2008-11/msg00031.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of evince");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_182.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_188.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_188.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_188.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830520);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:09:08 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:188");
   script_name( "Mandriva Update for kdewebdev4 MDVA-2008:188 (kdewebdev4)");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-12/msg00004.php
+  http://lists.mandriva.com/security-announce/2008-12/msg00004.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kdewebdev4");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_188.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_168.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_168.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_168.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831079);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-18 17:26:33 +0200 (Fri, 18 Jun 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:168");
   script_name("Mandriva Update for espeak MDVA-2010:168 (espeak)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_168.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_029.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_029.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_029.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830763);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2008:029");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-01/msg00052.php
+  http://lists.mandriva.com/security-announce/2008-01/msg00052.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ruby");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_029.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_140.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_140.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_140.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830508);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2008:140");
@@ -91,10 +93,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-07/msg00019.php
+  http://lists.mandriva.com/security-announce/2008-07/msg00019.php";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of ruby");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_140.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_230.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_230.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_230.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830483);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2008:230");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-11/msg00014.php
+  http://lists.mandriva.com/security-announce/2008-11/msg00014.php";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of firefox");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_230.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_026.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_026.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_026.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830852);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-29 14:09:25 +0100 (Fri, 29 Jan 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:026");
@@ -63,10 +65,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-01/msg00076.php
+  http://lists.mandriva.com/security-announce/2010-01/msg00076.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of openldap");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_026.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_109.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_109.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_109.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831060);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"cvss_base", value:"6.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:109");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_109.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_054.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_054.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_054.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831354);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-01 15:34:04 +0200 (Fri, 01 Apr 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2011:054");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_054.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_ie_vbscript_remote_code_exec_vuln.nasl 7497 2010-03-05 12:40:05Z mar $
+# $Id$
 #
 # MS Internet Explorer 'VBScript' Remote Code Execution Vulnerability (981169)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800482);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-10 15:48:25 +0100 (Wed, 10 Mar 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0483");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.5
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.5";
 
   script_description(desc);
   script_summary("Check for the version of Internet Explorer");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_ie_xml_doc_dos_vuln_aug09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_ie_xml_doc_dos_vuln_aug09.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ms_ie_xml_doc_dos_vuln_aug09.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_ie_xml_doc_dos_vuln_aug09.nasl 3820 2009-08-07 18:15:24Z aug $
+# $Id$
 #
 # Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800863);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-11 07:36:16 +0200 (Tue, 11 Aug 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-2668");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score      : 7.8 (AV:N/AC:L/Au:NR/C:N/I:N/A:C)
-    CVSS Temporal Score  : 6.6
-  Risk factor: High";
+    CVSS Temporal Score  : 6.6";
 
   script_description(desc);
   script_summary("Check for the Version of Internet Explorer");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_ie_xml_doc_dos_vuln_aug09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl 3791 2009-08-07 10:52:33Z aug $
+# $Id$
 #
 # Microsoft Windows Kernel 'win32k.sys' Privilege Escalation Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800862);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-11 07:36:16 +0200 (Tue, 11 Aug 2009)");
   script_tag(name:"cvss_base", value:"4.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-2653");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.6 (AV:L/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 4.2
-  Risk factor: Medium";
+    CVSS Temporal Score : 4.2";
 
   script_description(desc);
   script_summary("Check for the Windows win32k.sys Existence");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_win_kernel_win32k_sys_priv_esc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_netrisk_sec_bypass_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_netrisk_sec_bypass_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_netrisk_sec_bypass_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_netrisk_sec_bypass_vuln.nasl 4475 2009-09-04 15:57:11Z sep $
+# $Id$
 #
 # NetRisk Security Bypass Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800940);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-08 18:25:53 +0200 (Tue, 08 Sep 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-7155");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 6.7
-  Risk factor: High";
+    CVSS Temporal Score : 6.7";
 
   script_description(desc);
   script_summary("Check for the version of NetRisk");


Property changes on: trunk/openvas-plugins/scripts/gb_netrisk_sec_bypass_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_perl_archive_tar_26355.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_perl_archive_tar_26355.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_perl_archive_tar_26355.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100698);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-06 13:44:35 +0200 (Tue, 06 Jul 2010)");
  script_bugtraq_id(26355);
  script_cve_id("CVE-2007-4829");
- script_version ("1.0-$Revision$");
 
  script_name("Perl Archive::Tar Module Remote Directory Traversal Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_perl_archive_tar_26355.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_php_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_php_detect.nasl 311 2008-10-07 15:15:24Z oct $
+# $Id$
 #
 # PHP Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(800109);
-  script_version("Revision: 1.1");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-07 16:11:33 +0200 (Tue, 07 Oct 2008)");
   script_tag(name:"risk_factor", value:"None");
   script_name("PHP Version Detection");
   desc = "
   Overview : This script finds the installed PHP Version and saves the
-  version in KB.
+  version in KB.";
 
-  Risk factor : None";
-
   script_description(desc);
   script_family("Service detection");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_php_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_phpbb_45005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phpbb_45005.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_phpbb_45005.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100922);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-11-30 12:57:59 +0100 (Tue, 30 Nov 2010)");
  script_bugtraq_id(45005);
- script_version ("1.0-$Revision$");
 
  script_name("phpBB 'includes/message_parser.php' HTML Injection Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_phpbb_45005.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_pivotx_mult_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_pivotx_mult_xss_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_pivotx_mult_xss_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_pivotx_mult_xss_vuln.nasl 13578 2011-02-07 18:13:29 feb $
+# $Id$
 #
 # PivotX Multiple Cross-site Scripting Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801735);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-08 15:34:31 +0100 (Tue, 08 Feb 2011)");
   script_cve_id("CVE-2011-0772");
   script_bugtraq_id(45996);
   script_tag(name:"cvss_base", value:"4.3");


Property changes on: trunk/openvas-plugins/scripts/gb_pivotx_mult_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_qtweb_js_n_data_uri_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_qtweb_js_n_data_uri_xss_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_qtweb_js_n_data_uri_xss_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_qtweb_js_n_data_uri_xss_vuln.nasl 4413 2009-09-07 11:09:26Z sep $
+# $Id$
 #
 # QtWeb 'javascript:' And 'data:' URI XSS Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800899);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-08 18:25:53 +0200 (Tue, 08 Sep 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-3018");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:P/A:N)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of QtWeb");


Property changes on: trunk/openvas-plugins/scripts/gb_qtweb_js_n_data_uri_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_realplayer_code_exec_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_realplayer_code_exec_vuln_win.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_realplayer_code_exec_vuln_win.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_realplayer_code_exec_vuln_win.nasl 14851 2011-04-20 13:41:11Z apr $
+# $Id$
 #
 # RealNetworks RealPlayer 'OpenURLInDefaultBrowser()' Code Execution Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801779);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-22 16:38:12 +0200 (Fri, 22 Apr 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2011-1426");


Property changes on: trunk/openvas-plugins/scripts/gb_realplayer_code_exec_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_realplayer_ivr_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_realplayer_ivr_bof_vuln_win.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_realplayer_ivr_bof_vuln_win.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_realplayer_ivr_bof_vuln_win.nasl 14618 2011-04-07 13:41:11Z apr $
+# $Id$
 #
 # RealNetworks RealPlayer IVR File Processing Buffer Overflow Vulnerability (Windows)
 #
@@ -28,6 +28,8 @@
 {
   script_id(801768);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-11 14:40:00 +0200 (Mon, 11 Apr 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2011-1525");


Property changes on: trunk/openvas-plugins/scripts/gb_realplayer_ivr_bof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_realwin_scada_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_realwin_scada_bof_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_realwin_scada_bof_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_realwin_scada_bof_vuln.nasl 11990 2010-11-04 10:10:10Z nov $
+# $Id$
 #
 # RealWin SCADA System Buffer Overflow Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801622);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-02 18:01:36 +0100 (Tue, 02 Nov 2010)");
   script_bugtraq_id(44150);
   script_cve_id("CVE-2010-4142");
   script_tag(name:"cvss_base", value:"10.0");


Property changes on: trunk/openvas-plugins/scripts/gb_realwin_scada_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_nov09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_nov09_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_nov09_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_seamonkey_mult_vuln_nov09_lin.nasl 5567 2009-11-02 15:49:33Z nov $
+# $Id$
 #
 # Mozilla Seamonkey Multiple Vulnerabilities Nov-09 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801137);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-11-04 07:03:36 +0100 (Wed, 04 Nov 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-3372", "CVE-2009-3373", "CVE-2009-3376");
@@ -71,8 +73,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.8
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.8";
 
   script_description(desc);
   script_summary("Check for the version of Mozilla Seamonkey");


Property changes on: trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_nov09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_sigplus_pro_activex_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_sigplus_pro_activex_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_sigplus_pro_activex_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_sigplus_pro_activex_detect.nasl 10548 2010-08-09 13:13:15Z aug $
+# $Id$
 #
 # SigPlus Pro ActiveX Version Detection
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801251);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-10 14:39:31 +0200 (Tue, 10 Aug 2010)");
   script_tag(name:"risk_factor", value:"None");
   script_name("SigPlus Pro ActiveX Version Detection");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_sigplus_pro_activex_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_snortreport_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_snortreport_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_snortreport_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -38,7 +38,9 @@
  
  script_tag(name:"risk_factor", value:"None");
  script_id(100780);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-09-03 15:15:12 +0200 (Fri, 03 Sep 2010)");
 
  script_name("Snort Report Detection");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_snortreport_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_111070_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_111070_01.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_solaris_111070_01.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855194);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "111070-01");
   script_name( "Solaris Update for /etc/security/bsmunconv 111070-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-111070-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-111070-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of /etc/security/bsmunconv");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_111070_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_112797_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_112797_01.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_solaris_112797_01.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855284);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "112797-01");
   script_name( "Solaris Update for /usr/sbin/in.talkd 112797-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-112797-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-112797-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of /usr/sbin/in.talkd");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_112797_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_112923_04.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_112923_04.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_solaris_112923_04.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855610);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"cvss_base", value:"9.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "112923-04");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-112923-04-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-112923-04-1";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of krb5 usr/lib");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_112923_04.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_119255_73.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_119255_73.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_solaris_119255_73.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855887);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "119255-73");
   script_name("Solaris Update for Install and  Utilities 119255-73");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119255-73-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119255-73-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Install and  Utilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_119255_73.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_138373_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_138373_02.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_solaris_138373_02.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855183);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:34:39 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "138373-02");
   script_name( "Solaris Update for fifofs 138373-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138373-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138373-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of fifofs");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_138373_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_138876_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_138876_01.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_solaris_138876_01.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855414);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:34:39 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "138876-01");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138876-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138876-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of usr/lib/inet/in.dhcpd");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_138876_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_suse_2010_058.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_suse_2010_058.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_suse_2010_058.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(850151);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-04 09:11:34 +0100 (Tue, 04 Jan 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUSE-SA", value: "2010-058");


Property changes on: trunk/openvas-plugins/scripts/gb_suse_2010_058.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl 16762 2011-09-15 12:12:12Z sep $
+# $Id$
 #
 # Symantec Endpoint Protection Manager XSS and CSRF Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802242);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-16 17:22:17 +0200 (Fri, 16 Sep 2011)");
   script_cve_id("CVE-2011-0550", "CVE-2011-0551");
   script_bugtraq_id(48231, 49101);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/gb_symantec_endpoint_protection_xss_n_csrf_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_symphony_cms_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_symphony_cms_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_symphony_cms_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_symphony_cms_detect.nasl 9411 2010-06-10 12:50:55Z june $
+# $Id$
 #
 # Symphony CMS Version Detection
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801219);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-11 14:27:58 +0200 (Fri, 11 Jun 2010)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Symphony CMS Version Detection");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_symphony_cms_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_tinybb_45737.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_tinybb_45737.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_tinybb_45737.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(103028);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-13 13:28:59 +0100 (Thu, 13 Jan 2011)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2011-0443");
  script_bugtraq_id(45737);
- script_version ("1.0-$Revision$");
 
  script_name("TinyBB 'Profile' SQL Injection Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_tinybb_45737.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1002_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1002_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1002_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840537);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-23 15:30:07 +0100 (Tue, 23 Nov 2010)");
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1002-2");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1002_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1141_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1141_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1141_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840671);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-06 16:56:27 +0200 (Mon, 06 Jun 2011)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1141-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1141_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1205_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1205_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1205_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840739);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-16 17:22:17 +0200 (Fri, 16 Sep 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1205-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1205_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1242_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1242_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1242_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840789);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-31 13:45:00 +0100 (Mon, 31 Oct 2011)");
   script_tag(name:"cvss_base", value:"4.9");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "1242-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1242_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_496_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_496_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_496_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840108);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "496-2");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-August/000571.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-August/000571.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of poppler vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_496_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_609_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_609_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_609_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840305);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "609-1");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000700.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000700.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of hsqldb, openoffice.org/-amd64 vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_609_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_616_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_616_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_616_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840329);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "616-1");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-June/000718.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-June/000718.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of xorg-server vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_616_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_648_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_648_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_648_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840282);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "648-1");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-September/000756.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-September/000756.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of nasm vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_648_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_889_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_889_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_889_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840374);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-22 10:23:05 +0100 (Fri, 22 Jan 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "889-1");
@@ -58,10 +60,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001032.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001032.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of gzip vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_889_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_903_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_903_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_903_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840394);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:46:47 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "903-1");
@@ -65,10 +67,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-February/001051.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-February/001051.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_903_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_911_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_911_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_911_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840400);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "911-1");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-March/001059.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-March/001059.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of moin vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_911_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vmware_prdts_vix_api_mult_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vmware_prdts_vix_api_mult_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_vmware_prdts_vix_api_mult_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vmware_prdts_vix_api_mult_vuln.nasl 0290 2008-09-29 10:37:44Z sep $
+# $Id$
 #
 # VMware VIX API Multiple Buffer Overflow Vulnerabilities (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800007);
-  script_version("$Revision: 1.1 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-09-29 16:48:05 +0200 (Mon, 29 Sep 2008)");
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-2100");
@@ -80,8 +82,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.0 (AV:N/AC:M/Au:SI/C:P/I:P/A:P)
-    CVSS Temporal Score : 4.4
-  Risk factor: High";
+    CVSS Temporal Score : 4.4";
 
   script_description(desc);
   script_summary("Check for the version of VMware Products");


Property changes on: trunk/openvas-plugins/scripts/gb_vmware_prdts_vix_api_mult_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl 8352 2010-04-17 18:20:21Z apr $
+# $Id$
 #
 # VMware Products 'vmware-vmx' Information Disclosure Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801321);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-16 16:17:26 +0200 (Fri, 16 Apr 2010)");
   script_cve_id("CVE-2010-1138");
   script_bugtraq_id(39395);
   script_tag(name:"cvss_base", value:"5.0");


Property changes on: trunk/openvas-plugins/scripts/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vtiger_49927.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vtiger_49927.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_vtiger_49927.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103290);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-10-06 13:32:57 +0200 (Thu, 06 Oct 2011)");
  script_bugtraq_id(49927);
- script_version ("1.0-$Revision$");
 
  script_name("vtiger CRM Multiple Cross Site Scripting Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_vtiger_49927.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vtiger_crm_47263.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vtiger_crm_47263.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_vtiger_crm_47263.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103145);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-04-29 15:04:36 +0200 (Fri, 29 Apr 2011)");
  script_bugtraq_id(47263);
- script_version ("1.0-$Revision$");
 
  script_name("vtiger CRM 'sortfieldsjson.php' Local File Include Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_vtiger_crm_47263.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_wireshark_lua_script_code_exec_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wireshark_lua_script_code_exec_vuln_win.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_wireshark_lua_script_code_exec_vuln_win.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_wireshark_lua_script_code_exec_vuln_win.nasl 17344 2011-10-03 11:11:11Z oct $
+# $Id$
 #
 # Wireshark Lua Script File Arbitrary Code Execution Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802249);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-04 16:55:13 +0200 (Tue, 04 Oct 2011)");
   script_bugtraq_id(49528);
   script_cve_id("CVE-2011-3360");
   script_tag(name:"cvss_base", value:"6.9");


Property changes on: trunk/openvas-plugins/scripts/gb_wireshark_lua_script_code_exec_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_xm_easy_personal_ftp_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_xm_easy_personal_ftp_dos_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/gb_xm_easy_personal_ftp_dos_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_xm_easy_personal_ftp_dos_vuln.nasl 5237 2009-10-21 22:48:26Z oct $
+# $Id$
 #
 # XM Easy Personal FTP Server 'LIST' And 'NLST' Command DoS Vulnerability
 #
@@ -30,7 +30,9 @@
 if(description)
 {
   script_id(801120);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-22 15:34:45 +0200 (Thu, 22 Oct 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-3643", "CVE-2009-4048");
@@ -70,8 +72,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 4.5
-  Risk factor: Medium";
+    CVSS Temporal Score : 4.5";
 
   script_description(desc);
   script_summary("Check the version of XM Easy Personal FTP Server");


Property changes on: trunk/openvas-plugins/scripts/gb_xm_easy_personal_ftp_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200407_19.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200407_19.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200407_19.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54626);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200407-19 (Pavuk)";
  script_name(name);
@@ -45,10 +47,8 @@
     # emerge -pv '>=net-misc/pavuk-0.9.28-r3'
     # emerge '>=net-misc/pavuk-0.9.28-r3'
 
-http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200407-19
+http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200407-19";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200407-19 (Pavuk)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200407_19.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200408_13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200408_13.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200408_13.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54643);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200408-13 (kde, kdebase, kdelibs)";
  script_name(name);
@@ -54,10 +56,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=60068
 http://www.kde.org/info/security/advisory-20040811-1.txt
 http://www.kde.org/info/security/advisory-20040811-2.txt
-http://www.kde.org/info/security/advisory-20040811-3.txt
+http://www.kde.org/info/security/advisory-20040811-3.txt";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200408-13 (kde, kdebase, kdelibs)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200408_13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200502_15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200502_15.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200502_15.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54847);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200502-15 (PowerDNS)";
  script_name(name);
@@ -46,10 +48,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200502-15
 http://bugs.gentoo.org/show_bug.cgi?id=80713
 http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17
-http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21
+http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200502-15 (PowerDNS)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200502_15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200503_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200503_01.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200503_01.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54866);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200503-01 (qt)";
  script_name(name);
@@ -45,10 +47,8 @@
     # emerge --ask --oneshot --verbose '>=x11-libs/qt-3.3.4-r2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200503-01
-http://bugs.gentoo.org/show_bug.cgi?id=75181
+http://bugs.gentoo.org/show_bug.cgi?id=75181";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200503-01 (qt)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200503_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200503_19.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200503_19.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200503_19.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54884);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-0709", "CVE-2005-0710", "CVE-2005-0711");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200503-19 (mysql)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=dev-db/mysql-4.0.24'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200503-19
-http://bugs.gentoo.org/show_bug.cgi?id=84819
+http://bugs.gentoo.org/show_bug.cgi?id=84819";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200503-19 (mysql)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200503_19.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200504_05.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200504_05.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200504_05.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54907);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-0967", "CVE-2005-0966", "CVE-2005-0965");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200504-05 (Gaim)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200504-05
 http://bugs.gentoo.org/show_bug.cgi?id=87903
-http://gaim.sourceforge.net/security/
+http://gaim.sourceforge.net/security/";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200504-05 (Gaim)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200504_05.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200504_24.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200504_24.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200504_24.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54926);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200504-24 (eGroupWare)";
  script_name(name);
@@ -46,10 +48,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200504-24
 http://bugs.gentoo.org/show_bug.cgi?id=89517
-http://www.gulftech.org/?node=research&article_id=00069-04202005
+http://www.gulftech.org/?node=research&article_id=00069-04202005";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200504-24 (eGroupWare)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200504_24.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200511_11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200511_11.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200511_11.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(55860);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(15343);
  script_cve_id("CVE-2005-3524");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200511-11 (linux-ftpd-ssl)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose '>=net-ftp/ftpd-0.17-r3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200511-11
-http://bugs.gentoo.org/show_bug.cgi?id=111573
+http://bugs.gentoo.org/show_bug.cgi?id=111573";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200511-11 (linux-ftpd-ssl)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200511_11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200601_10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200601_10.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200601_10.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(56152);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-3905", "CVE-2005-3906");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200601-10 (sun-jdk sun-jre-bin blackdown-jre blackdown-jdk)";
@@ -70,10 +72,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200601-10
 http://bugs.gentoo.org/show_bug.cgi?id=118114
 http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1
-http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2005-03.txt
+http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2005-03.txt";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200601-10 (sun-jdk sun-jre-bin blackdown-jre blackdown-jdk)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200601_10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200604_15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200604_15.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200604_15.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(56682);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(17579);
  script_cve_id("CVE-2006-1905");
- script_version ("$");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200604-15 (xine-ui)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose '>=media-video/xine-ui-0.99.4-r5'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200604-15
-http://bugs.gentoo.org/show_bug.cgi?id=130801
+http://bugs.gentoo.org/show_bug.cgi?id=130801";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200604-15 (xine-ui)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200604_15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200606_18.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200606_18.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200606_18.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(56964);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200606-18 (pam_mysql)";
  script_name(name);
@@ -46,10 +48,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200606-18
 http://bugs.gentoo.org/show_bug.cgi?id=120842
-http://pam-mysql.sourceforge.net/News/
+http://pam-mysql.sourceforge.net/News/";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200606-18 (pam_mysql)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200606_18.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200606_19.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200606_19.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200606_19.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(56965);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-1173");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200606-19 (sendmail)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200606-19
 http://bugs.gentoo.org/show_bug.cgi?id=135141
-http://www.sendmail.org/releases/8.13.7.html
+http://www.sendmail.org/releases/8.13.7.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200606-19 (sendmail)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200606_19.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200607_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200607_03.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200607_03.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57119);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-2193", "CVE-2006-2656");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200607-03 (tiff)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-libs/tiff-3.8.2-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200607-03
-http://bugs.gentoo.org/show_bug.cgi?id=135881
+http://bugs.gentoo.org/show_bug.cgi?id=135881";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200607-03 (tiff)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200607_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200610_05.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200610_05.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200610_05.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57903);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-3126");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200610-05 (capi4hylafax)";
@@ -47,10 +49,8 @@
 '>=net-misc/capi4hylafax-01.03.00.99.300.3-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200610-05
-http://bugs.gentoo.org/show_bug.cgi?id=145982
+http://bugs.gentoo.org/show_bug.cgi?id=145982";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200610-05 (capi4hylafax)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200610_05.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200611_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200611_17.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200611_17.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57930);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-5969");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200611-17 (fvwm)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=x11-wm/fvwm-2.5.18-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200611-17
-http://bugs.gentoo.org/show_bug.cgi?id=155078
+http://bugs.gentoo.org/show_bug.cgi?id=155078";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200611-17 (fvwm)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200611_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200612_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200612_06.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200612_06.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57945);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-5462", "CVE-2006-5463", "CVE-2006-5464", "CVE-2006-5747", "CVE-2006-5748");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200612-06 (mozilla-thunderbird)";
@@ -59,10 +61,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200612-06
 http://bugs.gentoo.org/show_bug.cgi?id=154448
-https://bugzilla.mozilla.org/show_bug.cgi?id=360409
+https://bugzilla.mozilla.org/show_bug.cgi?id=360409";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200612-06 (mozilla-thunderbird)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200612_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200707_12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200707_12.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200707_12.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58533);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-3316");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200707-12 (vlc)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-video/vlc-0.8.6c'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200707-12
-http://bugs.gentoo.org/show_bug.cgi?id=182389
+http://bugs.gentoo.org/show_bug.cgi?id=182389";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200707-12 (vlc)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200707_12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200803_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200803_07.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200803_07.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60510);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-0299");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200803-07 (paramiko)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=dev-python/paramiko-1.7.2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200803-07
-http://bugs.gentoo.org/show_bug.cgi?id=205777
+http://bugs.gentoo.org/show_bug.cgi?id=205777";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200803-07 (paramiko)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200803_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200804_16.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200804_16.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200804_16.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60816);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-1720");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200804-16 (rsync)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=net-misc/rsync-2.6.9-r6'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200804-16
-http://bugs.gentoo.org/show_bug.cgi?id=216887
+http://bugs.gentoo.org/show_bug.cgi?id=216887";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200804-16 (rsync)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200804_16.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200804_30.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200804_30.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_200804_30.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60874);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-1671");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200804-30 (kdelibs)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=kde-base/kdelibs-3.5.8-r4'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200804-30
-http://bugs.gentoo.org/show_bug.cgi?id=218933
+http://bugs.gentoo.org/show_bug.cgi?id=218933";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200804-30 (kdelibs)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200804_30.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201001_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201001_03.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_201001_03.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(66641);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-07 13:59:33 +0100 (Thu, 07 Jan 2010)");
  script_cve_id("CVE-2008-5498", "CVE-2008-5514", "CVE-2008-5557", "CVE-2008-5624", "CVE-2008-5625", "CVE-2008-5658", "CVE-2008-5814", "CVE-2008-5844", "CVE-2008-7002", "CVE-2009-0754", "CVE-2009-1271", "CVE-2009-1272", "CVE-2009-2626", "CVE-2009-2687", "CVE-2009-3291");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Gentoo Security Advisory GLSA 201001-03 (php)");
@@ -65,10 +67,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=293888
 http://bugs.gentoo.org/show_bug.cgi?id=297369
 http://bugs.gentoo.org/show_bug.cgi?id=297370
-http://www.gentoo.org/security/en/glsa/glsa-200911-03.xml
+http://www.gentoo.org/security/en/glsa/glsa-200911-03.xml";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201001-03 (php)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201001_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201006_20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201006_20.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/glsa_201006_20.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,10 +30,12 @@
 if(description)
 {
  script_id(69023);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"7.8");
  script_cve_id("CVE-2009-2726", "CVE-2009-2346", "CVE-2009-4055", "CVE-2009-3727", "CVE-2008-7220");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
  script_name("Gentoo Security Advisory GLSA 201006-20 (asterisk)");
 
  desc = "The remote host is missing updates announced in
@@ -52,10 +54,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=281107
 http://bugs.gentoo.org/show_bug.cgi?id=283624
 http://bugs.gentoo.org/show_bug.cgi?id=284892
-http://bugs.gentoo.org/show_bug.cgi?id=295270
+http://bugs.gentoo.org/show_bug.cgi?id=295270";
 
-Risk factor: High";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201006-20 (asterisk)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201006_20.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/iWeb_37228.nasl
===================================================================
--- trunk/openvas-plugins/scripts/iWeb_37228.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/iWeb_37228.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100378);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-08 12:57:07 +0100 (Tue, 08 Dec 2009)");
  script_bugtraq_id(37228);
  script_cve_id("CVE-2009-4053");
- script_version ("1.0-$Revision$");
  script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"risk_factor", value:"Medium");
 
@@ -45,10 +47,8 @@
 
 References:
 http://www.securityfocus.com/bid/37228
-http://www.ashleybrown.co.uk/iweb/
+http://www.ashleybrown.co.uk/iweb/";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if iWeb Server is prone to a	directory-traversal vulnerability");
  script_category(ACT_ATTACK);


Property changes on: trunk/openvas-plugins/scripts/iWeb_37228.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/icecast_rbof.nasl
===================================================================
--- trunk/openvas-plugins/scripts/icecast_rbof.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/icecast_rbof.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,9 +28,11 @@
 if(description)
 {
  script_id(15399);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(4743);
  script_cve_id("CVE-2001-1230");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  
@@ -46,8 +48,7 @@
 As a result of this vulnerability, it is possible for a remote attacker
 to execute arbitrary code with the privilege of the server.
 
-Solution : Upgrade to a newer version.
-Risk factor : High";
+Solution : Upgrade to a newer version.";
 
 
 

Modified: trunk/openvas-plugins/scripts/imp_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/imp_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/imp_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,14 +30,14 @@
 
 IMP is a PHP-based webmail package from The Horde Project that provides
 access to mail accounts via POP3 or IMAP. See
-http://www.horde.org/imp/ for more information. 
+http://www.horde.org/imp/ for more information. ";
 
-Risk factor : None";
 
-
 if (description) {
   script_id(12643);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"None");
  
   name = "IMP Detection";

Modified: trunk/openvas-plugins/scripts/macosx_secupd_2009-005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/macosx_secupd_2009-005.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/macosx_secupd_2009-005.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,6 +27,8 @@
 {
  script_id(102028);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-12 14:48:44 +0200 (Wed, 12 May 2010)");
  script_cve_id("CVE-2009-2800","CVE-2009-2803","CVE-2009-1241","CVE-2009-1270","CVE-2008-6680","CVE-2009-1371","CVE-2009-1372","CVE-2009-2804","CVE-2009-2805","CVE-2009-2468","CVE-2009-0949","CVE-2009-2807","CVE-2009-1862","CVE-2009-1863","CVE-2009-1864","CVE-2009-1865","CVE-2009-1866","CVE-2009-1867","CVE-2009-1868","CVE-2009-1869","CVE-2009-1870","CVE-2009-2809","CVE-2009-2811","CVE-2009-2812","CVE-2008-2079","CVE-2009-1271","CVE-2009-1272","CVE-2008-5498","CVE-2009-2813","CVE-2009-2814");
  script_name("Mac OS X Security Update 2009-005");
  desc = "


Property changes on: trunk/openvas-plugins/scripts/macosx_secupd_2009-005.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mambo_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mambo_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/mambo_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: mambo_detect.nasl 113 2009-03-09 17:33:16Z mime $
+# $Id$
 #
 # mambo Detection
 #
@@ -31,14 +31,14 @@
   This host is running mambo a widely installed Open Source cms solution.
 
  See also:
-  http://www.mamboserver.com
+  http://www.mamboserver.com";
 
- Risk factor : None";
-
 if (description)
 {
  script_id(100036);
- script_version ("1.0");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-13 06:42:27 +0100 (Fri, 13 Mar 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("mambo Detection");  


Property changes on: trunk/openvas-plugins/scripts/mambo_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_091.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_091.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/mdksa_2009_091.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63769);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_cve_id("CVE-2009-0796");
- script_version ("$");
  script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:091 (mod_perl)";
@@ -53,10 +55,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:091
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:091";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:091 (mod_perl)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_091.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_109.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_109.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/mdksa_2009_109.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63951);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-11 20:24:31 +0200 (Mon, 11 May 2009)");
  script_cve_id("CVE-2009-1572");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:109 (quagga)";
@@ -53,10 +55,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:109
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:109";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:109 (quagga)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_109.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_123.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_123.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/mdksa_2009_123.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64138);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2009-1603");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:123 (opensc)";
@@ -52,10 +54,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:123
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:123";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:123 (opensc)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_123.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_243_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_243_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/mdksa_2009_243_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66421);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2009-0946");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandriva Security Advisory MDVSA-2009:243-2 (freetype2)");
@@ -55,10 +57,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:243-2
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:243-2";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:243-2 (freetype2)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_243_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_324.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_324.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/mdksa_2009_324.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66420);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2008-7068", "CVE-2009-1271", "CVE-2009-2687", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-3546", "CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4018");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandriva Security Advisory MDVSA-2009:324 (php)");
@@ -51,10 +53,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:324
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:324";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:324 (php)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_324.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/metacart_sql.nasl
===================================================================
--- trunk/openvas-plugins/scripts/metacart_sql.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/metacart_sql.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(18290);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(13385, 13384, 13383, 13382, 13639);
- script_version ("$Revision$");
  script_tag(name:"risk_factor", value:"High");
 
  name = "MetaCart E-Shop ProductsByCategory.ASP SQL and XSS Injection Vulnerabilities";
@@ -41,8 +43,7 @@
 An attacker may exploit these flaws to execute arbitrary SQL commands against the remote
 database or to perform a cross site scripting attack using the remote host.
 
-Solution : None at this time
-Risk factor : High";
+Solution : None at this time";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/mssql_brute_force.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mssql_brute_force.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/mssql_brute_force.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -39,7 +39,9 @@
 if(description)
 {
  script_id(10862);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"High");
  name = "Microsoft's SQL Server Brute Force";
  script_name(name);

Modified: trunk/openvas-plugins/scripts/netop_detect_udp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/netop_detect_udp.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/netop_detect_udp.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,7 +26,9 @@
 if(description)
 {
 	script_id(15766);
-	script_version ("$Revision$");
+	script_version("$Revision$");
+	script_tag(name:"last_modification", value:"$Date$");
+	script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
     script_tag(name:"risk_factor", value:"None");
 	name="NetOp products UDP detection";
 	script_name(name);
@@ -39,10 +41,8 @@
 
 
 Specific information will be given depending on the program
-detected
+detected";
 
-Risk factor: Depends on the specific program detected";
-
 	script_description(desc);
 	summary=
 	   "Determines if the remote host has any Danware NetOp program active on UDP";

Modified: trunk/openvas-plugins/scripts/nginx_36438.nasl
===================================================================
--- trunk/openvas-plugins/scripts/nginx_36438.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/nginx_36438.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100277);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-01 18:57:31 +0200 (Thu, 01 Oct 2009)");
  script_bugtraq_id(36438);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"Low");
 
  script_name("nginx Proxy DNS Cache Domain Spoofing Vulnerability");
@@ -50,10 +52,8 @@
 http://www.securityfocus.com/bid/36438
 http://nginx.net/
 http://www.securityfocus.com/archive/1/506541
-http://www.securityfocus.com/archive/1/506543
+http://www.securityfocus.com/archive/1/506543";
 
-Risk factor : Low";
-
  script_description(desc);
  script_summary("Determine if nginx is prone to a Proxy DNS Cache Domain Spoofing Vulnerability");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/nginx_36438.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/osticket_setup_php_accessible.nasl
===================================================================
--- trunk/openvas-plugins/scripts/osticket_setup_php_accessible.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/osticket_setup_php_accessible.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -24,7 +24,9 @@
 
 if (description) {
   script_id(13647);
-  script_version ("$Revision$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"Medium");
  
   name = "osTicket setup.php Accessibility";
@@ -45,9 +47,7 @@
 configuration (gained, say, from reading config.php). 
 
 Solution : Remove both setup.php and gpcvar.php and ensure permissions
-on config.php are 644. 
-
-Risk factor : Medium";
+on config.php are 644. ";
   script_description(desc);
  
   summary = "Checks Accessibility of osTicket's setup.php";

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0046.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0046.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0046.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(63343);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-10 15:52:40 +0100 (Tue, 10 Feb 2009)");
  script_cve_id("CVE-2009-0021");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:0046 (ntp)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0046
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0046
-https://rhn.redhat.com/errata/RHSA-2009-0046.html
+https://rhn.redhat.com/errata/RHSA-2009-0046.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:0046 (ntp)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_0046.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1504.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1504.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1504.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(66172);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_cve_id("CVE-2009-3603", "CVE-2009-3608", "CVE-2009-3609");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("CentOS Security Advisory CESA-2009:1504 (poppler)");
@@ -43,10 +45,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1504
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1504
-https://rhn.redhat.com/errata/RHSA-2009-1504.html
+https://rhn.redhat.com/errata/RHSA-2009-1504.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("CentOS Security Advisory CESA-2009:1504 (poppler)");


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1504.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/php_nuke_bb_smilies_passwd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/php_nuke_bb_smilies_passwd.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/php_nuke_bb_smilies_passwd.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
   script_id(10630);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_cve_id("CVE-2001-0320");
-  script_version ("$Revision$");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("PHP-Nuke security vulnerability (bb_smilies.php)");

Modified: trunk/openvas-plugins/scripts/phpgedview_multiple_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpgedview_multiple_flaws.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/phpgedview_multiple_flaws.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,6 +30,8 @@
 {
   script_id(11982);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"High");
   name = "phpGedView Code injection Vulnerability";
   script_name(name);
@@ -49,8 +51,7 @@
 - A code injection vulnerability, which may allow an attacker to make
   this server execute arbitrary PHP code hosted on a third party website.
 
-Solution : Upgrade to the latest version of this software
-Risk factor : High";
+Solution : Upgrade to the latest version of this software";
 
   script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/psychoblogger_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/psychoblogger_sql_injection.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/psychoblogger_sql_injection.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -30,6 +30,8 @@
 {
   script_id(11961);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"High");
   name = "Psychoblogger SQL Injection";
   script_name(name);
@@ -43,8 +45,7 @@
 create arbitrary accounts.
 
 
-Solution : Upgrade to the latest version of this CGI suite.
-Risk factor : High";
+Solution : Upgrade to the latest version of this CGI suite.";
 
   script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/qmtp_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/qmtp_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/qmtp_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -25,7 +25,9 @@
 if(description)
 {
   script_id(11134);
-  script_version ("$Revision$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"None");
  
   script_name("QMTP");
@@ -34,10 +36,8 @@
 For your information, a QMTP/QMQP server is running on this port.
 QMTP is a proposed replacement of SMTP by D.J. Bernstein.
 
-** Note that OpenVAS only runs SMTP tests currently.
+** Note that OpenVAS only runs SMTP tests currently.";
 
-Risk factor : None";
-
   script_description(desc);
  
   summary = "Detect QMTP servers";

Modified: trunk/openvas-plugins/scripts/remote-MS04-017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/remote-MS04-017.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/remote-MS04-017.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -38,6 +38,8 @@
 {
 script_id(101004);
 script_version("$Revision$");
+script_tag(name:"last_modification", value:"$Date$");
+script_tag(name:"creation_date", value:"2009-03-15 20:59:49 +0100 (Sun, 15 Mar 2009)");
 script_tag(name:"cvss_base", value:"7.5");
 script_tag(name:"risk_factor", value:"High");
 script_bugtraq_id(10260);
@@ -63,11 +65,8 @@
 Outlook 2003 with Business Contact Manager: 
 http://www.microsoft.com/downloads/details.aspx?FamilyId=9016B9F3-BA86-4A95-9D89-E120EF2E85E3&displaylang=en
 Microsoft Business Solutions CRM 1.2: 
-http://go.microsoft.com/fwlink/?LinkId=30127
+http://go.microsoft.com/fwlink/?LinkId=30127";
 
-
-Risk factor: High";
-
 script_description(desc);
 
 summary = "Vulnerability in Crystal Reports Web Viewer Could Allow Information Disclosure and Denial of Service";


Property changes on: trunk/openvas-plugins/scripts/remote-MS04-017.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_adobe_prdts_mult_vuln_apr10_lin.nasl 8469 2010-04-16 10:30:34Z apr $
+# $Id$
 #
 # Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902162);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-16 16:17:26 +0200 (Fri, 16 Apr 2010)");
   script_cve_id("CVE-2010-0190", "CVE-2010-0191", "CVE-2010-0192", "CVE-2010-0193",
                 "CVE-2010-0194", "CVE-2010-0195", "CVE-2010-0196", "CVE-2010-0197",
                 "CVE-2010-0198", "CVE-2010-0199", "CVE-2010-0201", "CVE-2010-0202",


Property changes on: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_cybozu_office_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_cybozu_office_xss_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_cybozu_office_xss_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_cybozu_office_xss_vuln.nasl 15892 2011-06-30 16:16:16Z jun $
+# $Id$
 #
 # Cybozu Office Address Book and User List Cross-Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902536);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-05 13:15:06 +0200 (Tue, 05 Jul 2011)");
   script_cve_id("CVE-2011-1335");
   script_bugtraq_id(48446);
   script_tag(name:"cvss_base", value:"4.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_cybozu_office_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_firefox_code_exec_vuln_jul09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_code_exec_vuln_jul09_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_firefox_code_exec_vuln_jul09_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_firefox_code_exec_vuln_jul09_lin.nasl 3622 2009-07-23 15:50:33Z jul $
+# $Id$
 #
 # Mozilla Firefox Remote Code Execution Vulnerabilities July-09 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900399);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-07-23 21:05:26 +0200 (Thu, 23 Jul 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-2467");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.8
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.8";
 
   script_description(desc);
   script_summary("Check for the Version of Firefox");


Property changes on: trunk/openvas-plugins/scripts/secpod_firefox_code_exec_vuln_jul09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_dec09_win01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_dec09_win01.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_dec09_win01.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_firefox_mult_vuln_dec09_win01.nasl 6283 2009-12-21 17:50:33Z dec $
+# $Id$
 #
 # Firefox Multiple Vulnerabilities Dec-09 (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902001);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-23 08:41:41 +0100 (Wed, 23 Dec 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984",
@@ -67,8 +69,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Firefox");


Property changes on: trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_dec09_win01.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_hyleos_chemview_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hyleos_chemview_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_hyleos_chemview_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_hyleos_chemview_detect.nasl 7392 2010-02-26 13:10:24Z feb $
+# $Id$
 #
 # Hyleos ChemView Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(900748);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 12:02:59 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Hyleos ChemView Version Detection");
   desc = "
   Overview: This script finds the installed Hyleos ChemView and saves the
-  version in KB.
+  version in KB.";
 
-  Risk factor : None";
-
   script_description(desc);
   script_summary("Set version of Hyleos ChemView in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_hyleos_chemview_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_joomla_com_xmap_sql_inj_vuln.nasl 16062 2011-07-20 16:53:29 jul $
+# $Id$
 #
 # Joomla com_xmap SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902397);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-22 12:16:19 +0200 (Fri, 22 Jul 2011)");
   script_bugtraq_id(48658);
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_mahara_xss_n_csrf_vuln.nasl 14524 2011-03-30 11:11:11Z mar $
+# $Id$
 #
 # Mahara Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901199);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-01 15:39:52 +0200 (Fri, 01 Apr 2011)");
   script_bugtraq_id(47033);
   script_cve_id("CVE-2011-0439", "CVE-2011-0440");
   script_tag(name:"cvss_base", value:"5.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_mahara_xss_n_csrf_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms09-025.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-025.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_ms09-025.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms09-025.nasl 2775 2009-06-10 09:14:35Z jun $
+# $Id$
 #
 # Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537)
 #
@@ -29,7 +29,9 @@
 if(description)
 {
   script_id(900669);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-10 16:35:14 +0200 (Wed, 10 Jun 2009)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-1123","CVE-2009-1124","CVE-2009-1125", "CVE-2009-1126");
@@ -65,10 +67,8 @@
 
   References:
   http://www.vupen.com/english/advisories/2009/1544
-  http://www.microsoft.com/technet/security/bulletin/ms09-025.mspx
+  http://www.microsoft.com/technet/security/bulletin/ms09-025.mspx";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the vulnerable file version");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_ms09-025.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms10-082.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-082.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_ms10-082.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms10-082.nasl 11494 2010-10-13 11:11:11Z oct $
+# $Id$
 #
 # Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901163);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-13 17:10:12 +0200 (Wed, 13 Oct 2010)");
   script_cve_id("CVE-2010-2745");
   script_bugtraq_id(43772);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms10-082.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms11-017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-017.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_ms11-017.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms11-017.nasl 14210 2011-03-09 13:14:35Z mar $
+# $Id$
 #
 # Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900273);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-09 15:35:07 +0100 (Wed, 09 Mar 2011)");
   script_cve_id("CVE-2011-0029");
   script_bugtraq_id(46678);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-017.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms_iis_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_iis_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_ms_iis_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms_iis_detect.nasl 2386 2009-05-19 12:54:36Z may $
+# $Id$
 #
 # Microsoft IIS Webserver Version Detection
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(900710);
-  script_version("Revision: 1.0 ");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-20 10:26:22 +0200 (Wed, 20 May 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Microsoft IIS Webserver Version Detection");
   desc = "
 
   Overview: This script detects the installed MS IIS Webserver and sets the
-  result in KB.
+  result in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Set the Version of Microsoft IIS in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_ms_iis_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_mysql_bof_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mysql_bof_vuln_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_mysql_bof_vuln_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_mysql_bof_vuln_lin.nasl 6504 2009-12-31 23:29:17Z dec $
+# $Id$
 #
 # MySQL Server Buffer Overflow Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901093);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-04 15:26:56 +0100 (Mon, 04 Jan 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-4484");
@@ -58,8 +60,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 6.1
-  Risk factor: High";
+    CVSS Temporal Score : 6.1";
 
   script_description(desc);
   script_summary("Check for the version of MySQL");


Property changes on: trunk/openvas-plugins/scripts/secpod_mysql_bof_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl 4257 2009-08-26 15:38:09Z aug $
+# $Id$
 #
 # NatterChat Multiple XSS And SQL Injection Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901007);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-27 13:43:20 +0200 (Thu, 27 Aug 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-7048", "CVE-2008-7049");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 6.7
-  Risk factor : High";
+    CVSS Temporal Score : 6.7";
 
   script_description(desc);
   script_summary("Check for the version of NatterChat");


Property changes on: trunk/openvas-plugins/scripts/secpod_natterchat_mult_xss_n_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_mar09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_mar09_lin.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_mar09_lin.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_oprea_mult_vuln_mar09_lin.nasl 984 2009-03-19 11:13:23Z mar $
+# $Id$
 #
 # Opera Web Browser Multiple Vulnerabilities (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900517);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-20 07:08:52 +0100 (Fri, 20 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0914", "CVE-2009-0915", "CVE-2009-0916");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Opera Web Browser");


Property changes on: trunk/openvas-plugins/scripts/secpod_opera_mult_vuln_mar09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_php_address_book_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_php_address_book_sql_inj_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_php_address_book_sql_inj_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_php_address_book_sql_inj_vuln.nasl 3684 2009-08-03 09:35:29Z Aug $
+# $Id$
 #
 # PHP Address Book Multiple SQL Injection Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900698);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-05 14:14:14 +0200 (Wed, 05 Aug 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-2608");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 6.1
-  Risk factor: High";
+    CVSS Temporal Score : 6.1";
 
   script_description(desc);
   script_summary("Check for the version of PHP-Nuke");


Property changes on: trunk/openvas-plugins/scripts/secpod_php_address_book_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_sjs_am_n_opensso_unspecified_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_sjs_am_n_opensso_unspecified_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_sjs_am_n_opensso_unspecified_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_sjs_am_n_opensso_unspecified_vuln.nasl 8470 2010-04-27 15:57:29Z apr $
+# $Id$
 #
 # Sun JS Access Manager And OpenSSO Unspecified Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902165);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-29 10:04:32 +0200 (Thu, 29 Apr 2010)");
   script_cve_id("CVE-2010-0894");
   script_bugtraq_id(39457);
   script_tag(name:"cvss_base", value:"5.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_sjs_am_n_opensso_unspecified_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_wordpress_detect_900182.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wordpress_detect_900182.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_wordpress_detect_900182.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_wordpress_detect_900182.nasl 740 2008-12-24 15:54:24Z dec $
+# $Id$
 #
 # WordPress Version Detection
 #
@@ -30,16 +30,16 @@
 if(description)
 {
   script_id(900182);
-  script_version("$Revision: 1.2 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-26 14:23:17 +0100 (Fri, 26 Dec 2008)");
   script_tag(name:"risk_factor", value:"None");
   script_name("WordPress Version Detection");
   desc = "
 
   Overview : This script detects the installed version of WordPress/WordPress-Mu
-  and sets the result in KB.
+  and sets the result in KB.";
 
-  Risk factor : None";
-
   script_description(desc);
   script_summary("Set version of WordPress/WordPress-Mu in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_wordpress_detect_900182.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_xtreamerpro_media_server_dir_trav_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_xtreamerpro_media_server_dir_trav_vuln.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/secpod_xtreamerpro_media_server_dir_trav_vuln.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_xtreamerpro_media_server_dir_trav_vuln.nasl 15303 2011-05-20 13:29:24Z may $
+# $Id$
 #
 # XtreamerPRO Media Server 'dir' Parameter Multiple Directory Traversal Vulnerabilities
 #
@@ -28,6 +28,8 @@
 {
   script_id(900286);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-26 10:47:46 +0200 (Thu, 26 May 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("XtreamerPRO Media Server 'dir' Parameter Multiple Directory Traversal Vulnerabilities");


Property changes on: trunk/openvas-plugins/scripts/secpod_xtreamerpro_media_server_dir_trav_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65774);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2009-0365");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for knetworkmanager");
@@ -48,10 +50,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for knetworkmanager");


Property changes on: trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_expat.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_expat.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles10_expat.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(66311);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-23 20:51:51 +0100 (Mon, 23 Nov 2009)");
  script_cve_id("CVE-2009-3720");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for expat");
@@ -48,10 +50,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for expat");


Property changes on: trunk/openvas-plugins/scripts/sles10_expat.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_hplip17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_hplip17.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles10_hplip17.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65962);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2007-5208");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.6");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for hplip17 and hplip17-hpijs");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for hplip17 and hplip17-hpijs");


Property changes on: trunk/openvas-plugins/scripts/sles10_hplip17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_python.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_python.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles10_python.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65883);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2008-1679", "CVE-2008-1887", "CVE-2008-3143", "CVE-2008-3142", "CVE-2008-3144", "CVE-2008-2315", "CVE-2008-2316");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for Python");
@@ -57,10 +59,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for Python");


Property changes on: trunk/openvas-plugins/scripts/sles10_python.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn0.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn0.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65727);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-3069", "CVE-2009-3070", "CVE-2009-3071", "CVE-2009-3072", "CVE-2009-3073", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES11: Security update for Mozilla");
@@ -52,10 +54,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for Mozilla");


Property changes on: trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn0.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5009819.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009819.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5009819.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65428);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-2447");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.0");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Samba");
@@ -57,10 +59,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Samba");


Property changes on: trunk/openvas-plugins/scripts/sles9p5009819.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5012017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012017.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5012017.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65278);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2004-0902", "CVE-2004-0903", "CVE-2004-0904", "CVE-2004-0905", "CVE-2004-0906", "CVE-2004-0908");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for Mozilla");
@@ -54,10 +56,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Mozilla");


Property changes on: trunk/openvas-plugins/scripts/sles9p5012017.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5015295.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015295.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5015295.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65344);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for sudo");
 
@@ -45,10 +47,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for sudo");


Property changes on: trunk/openvas-plugins/scripts/sles9p5015295.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5015723.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015723.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5015723.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65407);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-3783", "CVE-2005-3784", "CVE-2005-2973", "CVE-2005-3806", "CVE-2005-3055", "CVE-2005-3180", "CVE-2005-3044", "CVE-2005-3275", "CVE-2005-2490", "CVE-2005-3110", "CVE-2005-1041", "CVE-2005-2800", "CVE-2005-2872");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.6");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Linux kernel");
@@ -57,10 +59,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Linux kernel");


Property changes on: trunk/openvas-plugins/scripts/sles9p5015723.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5015928.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5015928.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5015928.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65333);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-0653", "CVE-2007-0654");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for XMMS");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for XMMS");


Property changes on: trunk/openvas-plugins/scripts/sles9p5015928.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5019909.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019909.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5019909.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65609);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-0013", "CVE-2005-0014");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for ncpfs");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for ncpfs");


Property changes on: trunk/openvas-plugins/scripts/sles9p5019909.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5021170.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021170.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5021170.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65109);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-0836", "CVE-2005-1974");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for Java2");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Java2");


Property changes on: trunk/openvas-plugins/scripts/sles9p5021170.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5040200.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5040200.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5040200.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65160);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2008-3933", "CVE-2008-4685");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for ethereal");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for ethereal");


Property changes on: trunk/openvas-plugins/scripts/sles9p5040200.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5060942.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5060942.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/sles9p5060942.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66070);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-27 01:37:56 +0100 (Tue, 27 Oct 2009)");
  script_cve_id("CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Apache 2");
@@ -55,10 +57,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Apache 2");


Property changes on: trunk/openvas-plugins/scripts/sles9p5060942.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/smb_nt_ms02-072.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_nt_ms02-072.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/smb_nt_ms02-072.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -25,9 +25,11 @@
 if(description)
 {
  script_id(11194);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(6427);
  script_cve_id("CAN-2002-1327");
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
@@ -52,10 +54,8 @@
 Microsoft Windows XP.
 
 See
-http://www.microsoft.com/technet/security/bulletin/ms02-072.mspx
+http://www.microsoft.com/technet/security/bulletin/ms02-072.mspx";
 
-Risk factor : High";
-
  script_description(desc);
  
  summary = "Checks for MS Hotfix 329390, Flaw in Microsoft XP Shell";

Modified: trunk/openvas-plugins/scripts/ubuntu_733_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_733_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ubuntu_733_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63618);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)");
  script_cve_id("CVE-2009-0587", "CVE-2008-4316");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-733-1 (evolution-data-server)";
@@ -61,10 +63,8 @@
 After a standard system upgrade you need to restart Evolution to effect
 the necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-733-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-733-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Ubuntu USN-733-1 (evolution-data-server)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_733_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_741_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_741_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ubuntu_741_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63699);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-31 19:20:21 +0200 (Tue, 31 Mar 2009)");
  script_cve_id("CVE-2009-0352", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0776");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-741-1 (thunderbird)";
@@ -72,10 +74,8 @@
 After a standard system upgrade you need to restart Thunderbird to effect
 the necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-741-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-741-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Ubuntu USN-741-1 (thunderbird)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_741_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_754_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_754_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ubuntu_754_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(63813);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-754-1 (clamav)";
  script_name(name);
@@ -56,10 +58,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-754-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-754-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Ubuntu USN-754-1 (clamav)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_754_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_791_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_791_2.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ubuntu_791_2.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64321);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-30 00:29:55 +0200 (Tue, 30 Jun 2009)");
  script_cve_id("CVE-2009-1171");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-791-2 (moodle)";
@@ -56,10 +58,8 @@
 After a standard system upgrade you need to access the Moodle instance
 and accept the database update to clear any invalid cached data.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-791-2
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-791-2";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Ubuntu USN-791-2 (moodle)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_791_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_843_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_843_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ubuntu_843_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65750);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2009-3369");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Ubuntu USN-843-1 (backuppc)");
@@ -61,10 +63,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-843-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-843-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Ubuntu USN-843-1 (backuppc)");


Property changes on: trunk/openvas-plugins/scripts/ubuntu_843_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_850_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_850_1.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/ubuntu_850_1.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66111);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-27 01:37:56 +0100 (Tue, 27 Oct 2009)");
  script_cve_id("CVE-2009-0755", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3605", "CVE-2009-3607", "CVE-2009-3608", "CVE-2009-3609");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Ubuntu USN-850-1 (poppler)");
@@ -68,10 +70,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-850-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-850-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Ubuntu USN-850-1 (poppler)");


Property changes on: trunk/openvas-plugins/scripts/ubuntu_850_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/wordpress_37005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/wordpress_37005.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/wordpress_37005.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100345);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-13 18:49:45 +0100 (Fri, 13 Nov 2009)");
  script_bugtraq_id(37005);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("WordPress 'wp-admin/includes/file.php' Arbitrary File Upload Vulnerability");
@@ -56,10 +58,8 @@
 http://www.securityfocus.com/bid/37005
 http://wordpress.org/
 http://www.securityfocus.com/archive/1/507819
-http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/
+http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/";
 
-Risk factor : High";
-
  script_description(desc);
  script_summary("Determine if WordPress version is < 2.8.6");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/wordpress_37005.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/writesrv.nasl
===================================================================
--- trunk/openvas-plugins/scripts/writesrv.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/writesrv.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -25,7 +25,9 @@
 if(description)
 {
   script_id(11222);
-  script_version ("$Revision$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"Low");
  
   name = "Writesrv";
@@ -38,10 +40,8 @@
 is connected and who isn't, easing social engineering attacks for
 example.
 
-Solution: disable this service if you don't use it
+Solution: disable this service if you don't use it";
 
-Risk factor : Low";
-
  script_description(desc);
  
  summary = "Detect writesrv";

Modified: trunk/openvas-plugins/scripts/xedus_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xedus_detect.nasl	2011-11-02 16:06:05 UTC (rev 11944)
+++ trunk/openvas-plugins/scripts/xedus_detect.nasl	2011-11-02 16:13:56 UTC (rev 11945)
@@ -27,8 +27,10 @@
 if(description)
 {
   script_id(14644);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 #  script_bugtraq_id(11071);
-  script_version("$Revision$");
   script_tag(name:"risk_factor", value:"Low");
   script_name("Xedus detection");
 
@@ -37,9 +39,7 @@
 The remote host runs Xedus Peer to Peer webserver, it provides
 the ability to share files, music, and any other media, as well 
 as create robust and dynamic web sites, which can feature 
-database access, file system access, with full .net support. 
-	
-Risk factor : Low";
+database access, file system access, with full .net support. ";
   script_description(desc);
 
   script_summary("Checks for presence of Xedus");



More information about the Openvas-commits mailing list