[Openvas-commits] r11981 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Thu Nov 3 18:48:59 CET 2011


Author: hdoreau
Date: 2011-11-03 18:47:29 +0100 (Thu, 03 Nov 2011)
New Revision: 11981

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/ComicShout_sql_injection.nasl
   trunk/openvas-plugins/scripts/DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1055.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl
   trunk/openvas-plugins/scripts/afs_version.nasl
   trunk/openvas-plugins/scripts/amanda_detect.nasl
   trunk/openvas-plugins/scripts/articlelive_xss.nasl
   trunk/openvas-plugins/scripts/asterisk_37153.nasl
   trunk/openvas-plugins/scripts/avirt_gateway_telnet.nasl
   trunk/openvas-plugins/scripts/badblue_null_byte.nasl
   trunk/openvas-plugins/scripts/cfengine_format_string_vuln.nasl
   trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl
   trunk/openvas-plugins/scripts/count_cgi.nasl
   trunk/openvas-plugins/scripts/cs_whois_34700.nasl
   trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl
   trunk/openvas-plugins/scripts/db2_discovery_DoS.nasl
   trunk/openvas-plugins/scripts/deb_022_1.nasl
   trunk/openvas-plugins/scripts/deb_054_1.nasl
   trunk/openvas-plugins/scripts/deb_1021_1.nasl
   trunk/openvas-plugins/scripts/deb_103_1.nasl
   trunk/openvas-plugins/scripts/deb_1306_1.nasl
   trunk/openvas-plugins/scripts/deb_1431_1.nasl
   trunk/openvas-plugins/scripts/deb_1636_1.nasl
   trunk/openvas-plugins/scripts/deb_1698_1.nasl
   trunk/openvas-plugins/scripts/deb_1829_1.nasl
   trunk/openvas-plugins/scripts/deb_1844_1.nasl
   trunk/openvas-plugins/scripts/deb_1909_1.nasl
   trunk/openvas-plugins/scripts/deb_2094_1.nasl
   trunk/openvas-plugins/scripts/deb_2144_1.nasl
   trunk/openvas-plugins/scripts/deb_2177_1.nasl
   trunk/openvas-plugins/scripts/deb_2208_1.nasl
   trunk/openvas-plugins/scripts/deb_2283_1.nasl
   trunk/openvas-plugins/scripts/deb_228_1.nasl
   trunk/openvas-plugins/scripts/deb_2293_1.nasl
   trunk/openvas-plugins/scripts/deb_285_1.nasl
   trunk/openvas-plugins/scripts/deb_292_3.nasl
   trunk/openvas-plugins/scripts/deb_520_1.nasl
   trunk/openvas-plugins/scripts/deb_604_1.nasl
   trunk/openvas-plugins/scripts/deb_626_1.nasl
   trunk/openvas-plugins/scripts/deb_765_1.nasl
   trunk/openvas-plugins/scripts/deb_968_1.nasl
   trunk/openvas-plugins/scripts/enterasys_dragon_reporting_detect.nasl
   trunk/openvas-plugins/scripts/fcore_2008_10755.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0814.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10285.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10525.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10751.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2128.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3405.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5552.nasl
   trunk/openvas-plugins/scripts/fcore_2009_6166.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8789.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9911.nasl
   trunk/openvas-plugins/scripts/freebsd_asterisk141.nasl
   trunk/openvas-plugins/scripts/freebsd_awstats.nasl
   trunk/openvas-plugins/scripts/freebsd_de-netscape7.nasl
   trunk/openvas-plugins/scripts/freebsd_drupal1.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox0.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox46.nasl
   trunk/openvas-plugins/scripts/freebsd_gtetrinet.nasl
   trunk/openvas-plugins/scripts/freebsd_hplip.nasl
   trunk/openvas-plugins/scripts/freebsd_id3lib.nasl
   trunk/openvas-plugins/scripts/freebsd_maradns.nasl
   trunk/openvas-plugins/scripts/freebsd_mpg123.nasl
   trunk/openvas-plugins/scripts/freebsd_mpg1231.nasl
   trunk/openvas-plugins/scripts/freebsd_nbsmtp.nasl
   trunk/openvas-plugins/scripts/freebsd_oftpd.nasl
   trunk/openvas-plugins/scripts/freebsd_openssl4.nasl
   trunk/openvas-plugins/scripts/freebsd_otrs2.nasl
   trunk/openvas-plugins/scripts/freebsd_php57.nasl
   trunk/openvas-plugins/scripts/freebsd_pivotx.nasl
   trunk/openvas-plugins/scripts/freebsd_png0.nasl
   trunk/openvas-plugins/scripts/freebsd_py24-pylons.nasl
   trunk/openvas-plugins/scripts/freebsd_rockdodger.nasl
   trunk/openvas-plugins/scripts/freebsd_wireshark.nasl
   trunk/openvas-plugins/scripts/freebsd_wordpress7.nasl
   trunk/openvas-plugins/scripts/freebsdsa_ipsec1.nasl
   trunk/openvas-plugins/scripts/freebsdsa_openssl.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0131_netpbm_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0135_tk_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0196_unzip_centos3_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0971_net-snmp_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0429_cups_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_1561_libvorbis_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0165_nspr_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0173_openssl096b_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0889_freetype_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0936_kernel_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0967_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_0013_wireshark_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_0486_xmlsec1_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_MediaWiki_42024.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0061-02_setroubleshoot.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0153-01_cups.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0192-01_cups.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0516-01_evolution.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0957-02_kernel.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_1036-01_firefox.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0625-01_wireshark.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0657-02_gdm.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0967-01_seamonkey.nasl
   trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_nov08_win.nasl
   trunk/openvas-plugins/scripts/gb_apache_apr_detect.nasl
   trunk/openvas-plugins/scripts/gb_aphpkb_mult_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_apple_safari_webkit_mult_vuln_mar10.nasl
   trunk/openvas-plugins/scripts/gb_bind_43573.nasl
   trunk/openvas-plugins/scripts/gb_cacti_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_core_ftp_server_40422.nasl
   trunk/openvas-plugins/scripts/gb_ecms_43640.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_0001_firefox_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_018_avahi_fc5.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_1383_xpdf_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_3191_chmsee_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_344_xen_fc5.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_3667_cacti_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_3958_htdig_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_4385_orage_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_0984_kernel_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_11511_gnome-python2-extras_fc10.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_11743_mediawiki_fc10.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_3231_seamonkey_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_4797_samba_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_6440_wireshark_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygem-activerecord_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8322_rubygem-actionmailer_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8399_devhelp_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_9667_evolution-rss_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_0388_transmission_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_11524_kvirc_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_12911_DeviceKit-power_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14268_fuse-encfs_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14996_sudo_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_4321_cpio_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_8558_quake3_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_9479_dhcp_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11019_kernel_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_13181_bcfg2_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_13465_gnome-python2-extras_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_13467_gnome-python2-extras_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_4244_nss_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdeartwork_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7756_mutt_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8667_gdk-pixbuf2_fc14.nasl
   trunk/openvas-plugins/scripts/gb_firefox_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/gb_firefox_unspecified_vuln_oct10_win.nasl
   trunk/openvas-plugins/scripts/gb_freefloat_ftp_rest_cmd_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ftpshell_server_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_gb_hp_openview_nnm_41829.nasl
   trunk/openvas-plugins/scripts/gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02458.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02623.nasl
   trunk/openvas-plugins/scripts/gb_icq_remote_code_exec_vuln.nasl
   trunk/openvas-plugins/scripts/gb_iwork_detect_macosx.nasl
   trunk/openvas-plugins/scripts/gb_kaspersky_av_2010_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_kerio_mailserver_xss_vuln_aug09.nasl
   trunk/openvas-plugins/scripts/gb_lunascape_detect.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_029_1.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_071.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_190.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_204_1.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_221.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_243.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_245.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_049.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_070.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_074.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_178.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_002.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_229.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_240.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_008.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_042.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_054.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_156.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_023.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_065.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_115.nasl
   trunk/openvas-plugins/scripts/gb_ms10-009.nasl
   trunk/openvas-plugins/scripts/gb_my_news_49818.nasl
   trunk/openvas-plugins/scripts/gb_nginx_http_request_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_novell_imanager_43635.nasl
   trunk/openvas-plugins/scripts/gb_novell_zhm_detect.nasl
   trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct08_lin.nasl
   trunk/openvas-plugins/scripts/gb_opera_xss_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_php_mult_vuln_dec09.nasl
   trunk/openvas-plugins/scripts/gb_phptroubleticket_38486.nasl
   trunk/openvas-plugins/scripts/gb_samba_40097.nasl
   trunk/openvas-plugins/scripts/gb_solaris_110671_04.nasl
   trunk/openvas-plugins/scripts/gb_solaris_112390_14.nasl
   trunk/openvas-plugins/scripts/gb_solaris_114362_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_119450_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_121096_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_121104_10.nasl
   trunk/openvas-plugins/scripts/gb_solaris_122912_17.nasl
   trunk/openvas-plugins/scripts/gb_solaris_126365_15.nasl
   trunk/openvas-plugins/scripts/gb_solaris_126929_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_138322_03.nasl
   trunk/openvas-plugins/scripts/gb_surge_ftp_server_admin_mult_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_suse_2008_025.nasl
   trunk/openvas-plugins/scripts/gb_symantec_altiris_ns_detect.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1113_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1138_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1164_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1225_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1232_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1249_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_404_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_418_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_457_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_561_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_644_1.nasl
   trunk/openvas-plugins/scripts/gb_vlc_media_player_mp4_bof_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_vmware_prdts_mult_vuln_win01.nasl
   trunk/openvas-plugins/scripts/gb_wordpress_php_speedy_plugin_title_param_xss.nasl
   trunk/openvas-plugins/scripts/gb_yahoo_msg_detect.nasl
   trunk/openvas-plugins/scripts/glsa_200405_07.nasl
   trunk/openvas-plugins/scripts/glsa_200406_22.nasl
   trunk/openvas-plugins/scripts/glsa_200408_24.nasl
   trunk/openvas-plugins/scripts/glsa_200410_16.nasl
   trunk/openvas-plugins/scripts/glsa_200603_17.nasl
   trunk/openvas-plugins/scripts/glsa_200611_01.nasl
   trunk/openvas-plugins/scripts/glsa_200701_02.nasl
   trunk/openvas-plugins/scripts/glsa_200701_09.nasl
   trunk/openvas-plugins/scripts/glsa_200701_17.nasl
   trunk/openvas-plugins/scripts/glsa_200702_01.nasl
   trunk/openvas-plugins/scripts/glsa_200703_07.nasl
   trunk/openvas-plugins/scripts/glsa_200705_25.nasl
   trunk/openvas-plugins/scripts/glsa_200711_27.nasl
   trunk/openvas-plugins/scripts/glsa_200712_25.nasl
   trunk/openvas-plugins/scripts/glsa_200804_28.nasl
   trunk/openvas-plugins/scripts/glsa_200809_06.nasl
   trunk/openvas-plugins/scripts/glsa_200903_07.nasl
   trunk/openvas-plugins/scripts/glsa_200911_03.nasl
   trunk/openvas-plugins/scripts/glsa_201006_03.nasl
   trunk/openvas-plugins/scripts/glsa_201101_01.nasl
   trunk/openvas-plugins/scripts/groupwise_web_interface_htmlver_hole.nasl
   trunk/openvas-plugins/scripts/http_trace.nasl
   trunk/openvas-plugins/scripts/icecast_slash_dos.nasl
   trunk/openvas-plugins/scripts/icq_installed.nasl
   trunk/openvas-plugins/scripts/kerio_wrf_management_detection.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_009.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_044.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_071.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_179.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_223_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_252_1.nasl
   trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl
   trunk/openvas-plugins/scripts/ms_telnet_overflow.nasl
   trunk/openvas-plugins/scripts/netware_perl_overflow.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1139.nasl
   trunk/openvas-plugins/scripts/php_fusion_6_00_110.nasl
   trunk/openvas-plugins/scripts/phpgroupware_html_injection.nasl
   trunk/openvas-plugins/scripts/sambar_cgi_path_disclosure.nasl
   trunk/openvas-plugins/scripts/secpod_3d_ftp_client_dir_traversal_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_alefmentor_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_apple_itunes_detection_win_900123.nasl
   trunk/openvas-plugins/scripts/secpod_blackberry_desktop_sec_bypass_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_cscart_sql_injection_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_dolphin_php_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ecoder_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_url_spoof_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_free_directory_script_file_inclusion_vuln_900181.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin_jun11.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_mar11_lin.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_db2_detect_win_900218.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_was_multiple_vuln_jul11.nasl
   trunk/openvas-plugins/scripts/secpod_jag_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_joomla_com_jresearch_lfi_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_macosx_su11-002.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-042.nasl
   trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_myre_real_estate_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_php_fusion_team_structure_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_spoonftp_retr_cmd_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_info_disc_vuln_lin.nasl
   trunk/openvas-plugins/scripts/secpod_tor_dir_queries_info_disc_vuln_win.nasl
   trunk/openvas-plugins/scripts/skullsplitter_html_injection.nasl
   trunk/openvas-plugins/scripts/sles10_dbus-1.nasl
   trunk/openvas-plugins/scripts/sles10_dhcp0.nasl
   trunk/openvas-plugins/scripts/sles10_openssl0.nasl
   trunk/openvas-plugins/scripts/sles9p5013784.nasl
   trunk/openvas-plugins/scripts/sles9p5017442.nasl
   trunk/openvas-plugins/scripts/sles9p5017619.nasl
   trunk/openvas-plugins/scripts/sles9p5041680.nasl
   trunk/openvas-plugins/scripts/teso_telnet.nasl
   trunk/openvas-plugins/scripts/ubuntu_735_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_740_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_862_1.nasl
   trunk/openvas-plugins/scripts/webalbum_local_file_include.nasl
   trunk/openvas-plugins/scripts/xnews.nasl
   trunk/openvas-plugins/scripts/zabbix_37308.nasl
Log:
* scripts/secpod_cscart_sql_injection_vuln.nasl,
scripts/gb_CESA-2011_0013_wireshark_centos4_i386.nasl,
scripts/freebsd_awstats.nasl,
scripts/amanda_detect.nasl,
scripts/gb_icq_remote_code_exec_vuln.nasl,
scripts/sles10_dbus-1.nasl,
scripts/gb_CESA-2010_0173_openssl096b_centos4_i386.nasl,
scripts/gb_fedora_2007_3191_chmsee_fc8.nasl,
scripts/gb_mandriva_MDKSA_2007_190.nasl,
scripts/gb_mandriva_MDVSA_2011_065.nasl,
scripts/gb_php_mult_vuln_dec09.nasl,
scripts/gb_solaris_122912_17.nasl,
scripts/gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl,
scripts/cs_whois_34700.nasl,
scripts/freebsd_gtetrinet.nasl,
scripts/gb_samba_40097.nasl,
scripts/netware_perl_overflow.nasl,
scripts/gb_solaris_138322_03.nasl,
scripts/deb_1021_1.nasl,
scripts/freebsd_asterisk141.nasl,
scripts/badblue_null_byte.nasl,
scripts/deb_1431_1.nasl,
scripts/gb_mandriva_MDVSA_2010_054.nasl,
scripts/gb_fedora_2010_0388_transmission_fc11.nasl,
scripts/gb_fedora_2008_0984_kernel_fc8.nasl,
scripts/gb_fedora_2008_3231_seamonkey_fc7.nasl,
scripts/freebsd_hplip.nasl,
scripts/deb_1829_1.nasl,
scripts/freebsd_maradns.nasl,
scripts/gb_CESA-2010_0889_freetype_centos5_i386.nasl,
scripts/deb_1636_1.nasl,
scripts/gb_cacti_sql_inj_vuln.nasl,
scripts/gb_adobe_flash_player_mult_vuln_nov08_win.nasl,
scripts/ms_telnet_overflow.nasl,
scripts/gb_firefox_unspecified_vuln_oct10_win.nasl,
scripts/teso_telnet.nasl,
scripts/deb_1306_1.nasl,
scripts/gb_RHSA-2010_0967-01_seamonkey.nasl,
scripts/deb_022_1.nasl,
scripts/deb_2177_1.nasl,
scripts/gb_mandriva_MDVA_2008_074.nasl,
scripts/gb_mandriva_MDVSA_2011_023.nasl,
scripts/gb_RHSA-2010_0657-02_gdm.nasl,
scripts/gb_vlc_media_player_mp4_bof_vuln_lin.nasl,
scripts/gb_solaris_112390_14.nasl,
scripts/gb_CESA-2011_0486_xmlsec1_centos5_i386.nasl,
scripts/gb_fedora_2008_11511_gnome-python2-extras_fc10.nasl,
scripts/RHSA_2009_1431.nasl,
scripts/secpod_ms09-042.nasl,
scripts/deb_103_1.nasl,
scripts/gb_mandriva_MDVA_2010_178.nasl,
scripts/fcore_2009_8789.nasl,
scripts/gb_ubuntu_USN_418_1.nasl,
scripts/gb_ubuntu_USN_1232_2.nasl,
scripts/gb_ubuntu_USN_1138_2.nasl,
scripts/gb_lunascape_detect.nasl,
scripts/avirt_gateway_telnet.nasl,
scripts/deb_626_1.nasl,
scripts/gb_RHSA-2008_1036-01_firefox.nasl,
scripts/freebsd_wireshark.nasl,
scripts/secpod_alefmentor_sql_inj_vuln.nasl,
scripts/db2_discovery_DoS.nasl,
scripts/gb_solaris_114362_01.nasl,
scripts/gb_nginx_http_request_bof_vuln.nasl,
scripts/gb_RHSA-2008_0957-02_kernel.nasl,
scripts/gb_novell_zhm_detect.nasl,
scripts/gb_fedora_2008_8322_rubygem-actionmailer_fc9.nasl,
scripts/gb_fedora_2011_7756_mutt_fc13.nasl,
scripts/gb_fedora_2008_4797_samba_fc7.nasl,
scripts/gb_fedora_2007_4385_orage_fc7.nasl,
scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl,
scripts/gb_fedora_2007_344_xen_fc5.nasl,
scripts/secpod_ecoder_xss_vuln.nasl,
scripts/gb_RHSA-2008_0516-01_evolution.nasl,
scripts/freebsd_openssl4.nasl,
scripts/gb_fedora_2008_6440_wireshark_fc9.nasl,
scripts/secpod_apple_itunes_detection_win_900123.nasl,
scripts/freebsd_nbsmtp.nasl,
scripts/secpod_macosx_su11-002.nasl,
scripts/mdksa_2009_252_1.nasl,
scripts/RHSA_2009_1055.nasl,
scripts/gb_mandriva_MDVSA_2008_240.nasl,
scripts/secpod_google_chrome_mult_vuln_lin_jun11.nasl,
scripts/secpod_myre_real_estate_sql_inj_vuln.nasl,
scripts/gb_fedora_2011_8667_gdk-pixbuf2_fc14.nasl,
scripts/glsa_201101_01.nasl,
scripts/gb_apache_apr_detect.nasl,
scripts/gb_core_ftp_server_40422.nasl,
scripts/gb_fedora_2007_1383_xpdf_fc7.nasl,
scripts/glsa_200703_07.nasl,
scripts/glsa_200406_22.nasl,
scripts/skullsplitter_html_injection.nasl,
scripts/gb_solaris_110671_04.nasl,
scripts/gb_fedora_2010_11524_kvirc_fc12.nasl,
scripts/fcore_2008_10755.nasl,
scripts/gb_mandriva_MDVA_2011_002.nasl,
scripts/deb_2094_1.nasl,
scripts/xnews.nasl,
scripts/gb_ubuntu_USN_1249_1.nasl,
scripts/gb_mandriva_MDKSA_2007_204_1.nasl,
scripts/gb_mandriva_MDVSA_2010_156.nasl,
scripts/glsa_200408_24.nasl,
scripts/gb_CESA-2010_0165_nspr_centos4_i386.nasl,
scripts/articlelive_xss.nasl,
scripts/gb_fedora_2010_8558_quake3_fc12.nasl,
scripts/cutenews_dir_traversal.nasl,
scripts/webalbum_local_file_include.nasl,
scripts/fcore_2009_10751.nasl,
scripts/gb_solaris_121096_02.nasl,
scripts/glsa_200701_09.nasl,
scripts/freebsd_rockdodger.nasl,
scripts/gb_phptroubleticket_38486.nasl,
scripts/gb_hp_ux_HPSBUX00228.nasl,
scripts/gb_firefox_info_disc_vuln.nasl,
scripts/php_fusion_6_00_110.nasl,
scripts/gb_CESA-2009_0429_cups_centos5_i386.nasl,
scripts/gb_mandriva_MDKA_2007_071.nasl,
scripts/gb_fedora_2010_9479_dhcp_fc12.nasl,
scripts/gb_ubuntu_USN_511_1.nasl,
scripts/gb_ubuntu_USN_644_1.nasl,
scripts/gb_fedora_2011_13467_gnome-python2-extras_fc14.nasl,
scripts/mdksa_2009_179.nasl,
scripts/gb_mandriva_MDVSA_2010_008.nasl,
scripts/deb_604_1.nasl,
scripts/phpgroupware_html_injection.nasl,
scripts/gb_ubuntu_USN_561_1.nasl,
scripts/secpod_ibm_was_multiple_vuln_jul11.nasl,
scripts/gb_aphpkb_mult_xss_vuln.nasl,
scripts/gb_fedora_2011_11019_kernel_fc15.nasl,
scripts/gb_hp_ux_HPSBUX02623.nasl,
scripts/gb_RHSA-2008_0061-02_setroubleshoot.nasl,
scripts/gb_RHSA-2010_0625-01_wireshark.nasl,
scripts/freebsd_oftpd.nasl,
scripts/gb_fedora_2010_12911_DeviceKit-power_fc12.nasl,
scripts/gb_hp_ux_HPSBUX02458.nasl,
scripts/mdksa_2009_009.nasl,
scripts/secpod_blackberry_desktop_sec_bypass_vuln.nasl,
scripts/secpod_cyrus_imap_server_bof_vuln.nasl,
scripts/gb_mandriva_MDKSA_2007_221.nasl,
scripts/gb_fedora_2011_13181_bcfg2_fc14.nasl,
scripts/freebsd_pivotx.nasl,
scripts/deb_968_1.nasl,
scripts/deb_054_1.nasl,
scripts/fcore_2009_9911.nasl,
scripts/deb_2283_1.nasl,
scripts/fcore_2009_10285.nasl,
scripts/mdksa_2009_223_1.nasl,
scripts/secpod_spoonftp_retr_cmd_dos_vuln.nasl,
scripts/secpod_ibm_db2_detect_win_900218.nasl,
scripts/gb_RHSA-2008_0153-01_cups.nasl,
scripts/sles9p5013784.nasl,
scripts/http_trace.nasl,
scripts/secpod_3d_ftp_client_dir_traversal_vuln.nasl,
scripts/mdksa_2009_071.nasl,
scripts/afs_version.nasl,
scripts/freebsdsa_ipsec1.nasl,
scripts/glsa_201006_03.nasl,
scripts/gb_ubuntu_USN_457_1.nasl,
scripts/gb_CESA-2008_0196_unzip_centos3_x86_64.nasl,
scripts/freebsd_mpg123.nasl,
scripts/gb_novell_imanager_43635.nasl,
scripts/freebsd_de-netscape7.nasl,
scripts/gb_RHSA-2008_0192-01_cups.nasl,
scripts/glsa_200809_06.nasl,
scripts/icq_installed.nasl,
scripts/mdksa_2009_044.nasl,
scripts/ComicShout_sql_injection.nasl,
scripts/gb_solaris_126929_02.nasl,
scripts/gb_CESA-2008_0971_net-snmp_centos3_i386.nasl,
scripts/gb_gb_hp_openview_nnm_41829.nasl,
scripts/glsa_200911_03.nasl,
scripts/glsa_200903_07.nasl,
scripts/gb_fedora_2010_14268_fuse-encfs_fc13.nasl,
scripts/gb_ubuntu_USN_428_2.nasl,
scripts/gb_ubuntu_USN_404_1.nasl,
scripts/sambar_cgi_path_disclosure.nasl,
scripts/DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl,
scripts/gb_iwork_detect_macosx.nasl,
scripts/gb_ecms_43640.nasl,
scripts/gb_mandriva_MDVA_2008_070.nasl,
scripts/gb_freefloat_ftp_rest_cmd_bof_vuln.nasl,
scripts/glsa_200705_25.nasl,
scripts/freebsd_wordpress7.nasl,
scripts/gb_mandriva_MDVSA_2011_115.nasl,
scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl,
scripts/merak_multiple_vulns.nasl,
scripts/secpod_php_fusion_team_structure_sql_inj_vuln.nasl,
scripts/deb_520_1.nasl,
scripts/freebsd_php57.nasl,
scripts/freebsd_firefox46.nasl,
scripts/deb_2293_1.nasl,
scripts/gb_ubuntu_USN_1225_1.nasl,
scripts/ubuntu_862_1.nasl,
scripts/gb_ftpshell_server_bof_vuln.nasl,
scripts/gb_fedora_2007_018_avahi_fc5.nasl,
scripts/asterisk_37153.nasl,
scripts/glsa_200410_16.nasl,
scripts/fcore_2009_2128.nasl,
scripts/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl,
scripts/zabbix_37308.nasl,
scripts/icecast_slash_dos.nasl,
scripts/gb_vmware_prdts_mult_vuln_win01.nasl,
scripts/glsa_200711_27.nasl,
scripts/secpod_firefox_url_spoof_vuln_win.nasl,
scripts/freebsd_drupal1.nasl,
scripts/gb_ubuntu_USN_1164_1.nasl,
scripts/gb_CESA-2009_1561_libvorbis_centos5_i386.nasl,
scripts/sles9p5017442.nasl,
scripts/freebsdsa_openssl.nasl,
scripts/ubuntu_740_1.nasl,
scripts/gb_bind_43573.nasl,
scripts/secpod_tor_dir_queries_info_disc_vuln_win.nasl,
scripts/glsa_200804_28.nasl,
scripts/cisco_ios_ftp_server_auth_bypass.nasl,
scripts/fcore_2009_0814.nasl,
scripts/deb_2208_1.nasl,
scripts/deb_2144_1.nasl,
scripts/gb_mandriva_MDVA_2008_049.nasl,
scripts/gb_symantec_altiris_ns_detect.nasl,
scripts/sles9p5017619.nasl,
scripts/sles10_dhcp0.nasl,
scripts/gb_surge_ftp_server_admin_mult_xss_vuln.nasl,
scripts/secpod_jag_info_disc_vuln.nasl,
scripts/gb_fedora_2011_4244_nss_fc14.nasl,
scripts/freebsd_mpg1231.nasl,
scripts/glsa_200611_01.nasl,
scripts/glsa_200603_17.nasl,
scripts/deb_285_1.nasl,
scripts/gb_mandriva_MDKSA_2007_243.nasl,
scripts/gb_fedora_2008_8399_devhelp_fc8.nasl,
scripts/gb_CESA-2008_0135_tk_centos4_i386.nasl,
scripts/gb_fedora_2008_11743_mediawiki_fc10.nasl,
scripts/freebsd_id3lib.nasl,
scripts/gb_CESA-2010_0936_kernel_centos4_i386.nasl,
scripts/glsa_200702_01.nasl,
scripts/deb_228_1.nasl,
scripts/gb_opera_xss_vuln_lin.nasl,
scripts/gb_fedora_2007_3958_htdig_fc8.nasl,
scripts/gb_suse_2008_025.nasl,
scripts/gb_fedora_2007_0001_firefox_fc7.nasl,
scripts/gb_apple_safari_webkit_mult_vuln_mar10.nasl,
scripts/ovcesa2009_1139.nasl,
scripts/gb_ms10-009.nasl,
scripts/gb_fedora_2011_5200_kdeartwork_fc14.nasl,
scripts/freebsd_firefox0.nasl,
scripts/deb_292_3.nasl,
scripts/gb_wordpress_php_speedy_plugin_title_param_xss.nasl,
scripts/gb_opera_mult_vuln_oct08_lin.nasl,
scripts/secpod_free_directory_script_file_inclusion_vuln_900181.nasl,
scripts/count_cgi.nasl,
scripts/sles9p5041680.nasl,
scripts/gb_kaspersky_av_2010_dos_vuln.nasl,
scripts/gb_kerio_mailserver_xss_vuln_aug09.nasl,
scripts/secpod_dolphin_php_info_disc_vuln.nasl,
scripts/fcore_2009_10525.nasl,
scripts/gb_fedora_2010_14996_sudo_fc12.nasl,
scripts/secpod_google_chrome_mult_vuln_aug10.nasl,
scripts/glsa_200701_02.nasl,
scripts/gb_fedora_2007_3667_cacti_fc8.nasl,
scripts/groupwise_web_interface_htmlver_hole.nasl,
scripts/sles10_openssl0.nasl,
scripts/deb_765_1.nasl,
scripts/gb_ubuntu_USN_1113_1.nasl,
scripts/enterasys_dragon_reporting_detect.nasl,
scripts/gb_mandriva_MDKSA_2007_245.nasl,
scripts/gb_solaris_119450_01.nasl,
scripts/gb_mandriva_MDVSA_2010_042.nasl,
scripts/glsa_200712_25.nasl,
scripts/freebsd_otrs2.nasl,
scripts/freebsd_png0.nasl,
scripts/secpod_sun_java_dir_server_info_disc_vuln_lin.nasl,
scripts/ubuntu_735_1.nasl,
scripts/deb_1698_1.nasl,
scripts/fcore_2009_5552.nasl,
scripts/cfengine_format_string_vuln.nasl,
scripts/gb_CESA-2008_0131_netpbm_centos4_x86_64.nasl,
scripts/deb_1909_1.nasl,
scripts/gb_solaris_126365_15.nasl,
scripts/gb_MediaWiki_42024.nasl,
scripts/fcore_2009_6166.nasl,
scripts/gb_CESA-2010_0967_seamonkey_centos4_i386.nasl,
scripts/gb_solaris_121104_10.nasl,
scripts/gb_fedora_2008_8282_rubygem-activerecord_fc8.nasl,
scripts/gb_my_news_49818.nasl,
scripts/deb_1844_1.nasl,
scripts/gb_fedora_2010_4321_cpio_fc12.nasl,
scripts/fcore_2009_3405.nasl,
scripts/RHSA_2009_1101.nasl,
scripts/secpod_google_chrome_mult_vuln_mar11_lin.nasl,
scripts/gb_mandriva_MDVSA_2008_229.nasl,
scripts/gb_fedora_2011_13465_gnome-python2-extras_fc15.nasl,
scripts/gb_hp_ux_HPSBUX00169.nasl,
scripts/glsa_200405_07.nasl,
scripts/kerio_wrf_management_detection.nasl,
scripts/gb_mandriva_MDKA_2007_029_1.nasl,
scripts/gb_fedora_2008_9667_evolution-rss_fc8.nasl,
scripts/freebsd_py24-pylons.nasl,
scripts/gb_yahoo_msg_detect.nasl,
scripts/secpod_joomla_com_jresearch_lfi_vuln.nasl,
scripts/glsa_200701_17.nasl:
Updated script metadata (changes for CR56).



Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/ChangeLog	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,5 +1,309 @@
 2011-11-3  Henri Doreau <henri.doreau at greenbone.net>
 
+	* scripts/secpod_cscart_sql_injection_vuln.nasl,
+	scripts/gb_CESA-2011_0013_wireshark_centos4_i386.nasl,
+	scripts/freebsd_awstats.nasl,
+	scripts/amanda_detect.nasl,
+	scripts/gb_icq_remote_code_exec_vuln.nasl,
+	scripts/sles10_dbus-1.nasl,
+	scripts/gb_CESA-2010_0173_openssl096b_centos4_i386.nasl,
+	scripts/gb_fedora_2007_3191_chmsee_fc8.nasl,
+	scripts/gb_mandriva_MDKSA_2007_190.nasl,
+	scripts/gb_mandriva_MDVSA_2011_065.nasl,
+	scripts/gb_php_mult_vuln_dec09.nasl,
+	scripts/gb_solaris_122912_17.nasl,
+	scripts/gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl,
+	scripts/cs_whois_34700.nasl,
+	scripts/freebsd_gtetrinet.nasl,
+	scripts/gb_samba_40097.nasl,
+	scripts/netware_perl_overflow.nasl,
+	scripts/gb_solaris_138322_03.nasl,
+	scripts/deb_1021_1.nasl,
+	scripts/freebsd_asterisk141.nasl,
+	scripts/badblue_null_byte.nasl,
+	scripts/deb_1431_1.nasl,
+	scripts/gb_mandriva_MDVSA_2010_054.nasl,
+	scripts/gb_fedora_2010_0388_transmission_fc11.nasl,
+	scripts/gb_fedora_2008_0984_kernel_fc8.nasl,
+	scripts/gb_fedora_2008_3231_seamonkey_fc7.nasl,
+	scripts/freebsd_hplip.nasl,
+	scripts/deb_1829_1.nasl,
+	scripts/freebsd_maradns.nasl,
+	scripts/gb_CESA-2010_0889_freetype_centos5_i386.nasl,
+	scripts/deb_1636_1.nasl,
+	scripts/gb_cacti_sql_inj_vuln.nasl,
+	scripts/gb_adobe_flash_player_mult_vuln_nov08_win.nasl,
+	scripts/ms_telnet_overflow.nasl,
+	scripts/gb_firefox_unspecified_vuln_oct10_win.nasl,
+	scripts/teso_telnet.nasl,
+	scripts/deb_1306_1.nasl,
+	scripts/gb_RHSA-2010_0967-01_seamonkey.nasl,
+	scripts/deb_022_1.nasl,
+	scripts/deb_2177_1.nasl,
+	scripts/gb_mandriva_MDVA_2008_074.nasl,
+	scripts/gb_mandriva_MDVSA_2011_023.nasl,
+	scripts/gb_RHSA-2010_0657-02_gdm.nasl,
+	scripts/gb_vlc_media_player_mp4_bof_vuln_lin.nasl,
+	scripts/gb_solaris_112390_14.nasl,
+	scripts/gb_CESA-2011_0486_xmlsec1_centos5_i386.nasl,
+	scripts/gb_fedora_2008_11511_gnome-python2-extras_fc10.nasl,
+	scripts/RHSA_2009_1431.nasl,
+	scripts/secpod_ms09-042.nasl,
+	scripts/deb_103_1.nasl,
+	scripts/gb_mandriva_MDVA_2010_178.nasl,
+	scripts/fcore_2009_8789.nasl,
+	scripts/gb_ubuntu_USN_418_1.nasl,
+	scripts/gb_ubuntu_USN_1232_2.nasl,
+	scripts/gb_ubuntu_USN_1138_2.nasl,
+	scripts/gb_lunascape_detect.nasl,
+	scripts/avirt_gateway_telnet.nasl,
+	scripts/deb_626_1.nasl,
+	scripts/gb_RHSA-2008_1036-01_firefox.nasl,
+	scripts/freebsd_wireshark.nasl,
+	scripts/secpod_alefmentor_sql_inj_vuln.nasl,
+	scripts/db2_discovery_DoS.nasl,
+	scripts/gb_solaris_114362_01.nasl,
+	scripts/gb_nginx_http_request_bof_vuln.nasl,
+	scripts/gb_RHSA-2008_0957-02_kernel.nasl,
+	scripts/gb_novell_zhm_detect.nasl,
+	scripts/gb_fedora_2008_8322_rubygem-actionmailer_fc9.nasl,
+	scripts/gb_fedora_2011_7756_mutt_fc13.nasl,
+	scripts/gb_fedora_2008_4797_samba_fc7.nasl,
+	scripts/gb_fedora_2007_4385_orage_fc7.nasl,
+	scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl,
+	scripts/gb_fedora_2007_344_xen_fc5.nasl,
+	scripts/secpod_ecoder_xss_vuln.nasl,
+	scripts/gb_RHSA-2008_0516-01_evolution.nasl,
+	scripts/freebsd_openssl4.nasl,
+	scripts/gb_fedora_2008_6440_wireshark_fc9.nasl,
+	scripts/secpod_apple_itunes_detection_win_900123.nasl,
+	scripts/freebsd_nbsmtp.nasl,
+	scripts/secpod_macosx_su11-002.nasl,
+	scripts/mdksa_2009_252_1.nasl,
+	scripts/RHSA_2009_1055.nasl,
+	scripts/gb_mandriva_MDVSA_2008_240.nasl,
+	scripts/secpod_google_chrome_mult_vuln_lin_jun11.nasl,
+	scripts/secpod_myre_real_estate_sql_inj_vuln.nasl,
+	scripts/gb_fedora_2011_8667_gdk-pixbuf2_fc14.nasl,
+	scripts/glsa_201101_01.nasl,
+	scripts/gb_apache_apr_detect.nasl,
+	scripts/gb_core_ftp_server_40422.nasl,
+	scripts/gb_fedora_2007_1383_xpdf_fc7.nasl,
+	scripts/glsa_200703_07.nasl,
+	scripts/glsa_200406_22.nasl,
+	scripts/skullsplitter_html_injection.nasl,
+	scripts/gb_solaris_110671_04.nasl,
+	scripts/gb_fedora_2010_11524_kvirc_fc12.nasl,
+	scripts/fcore_2008_10755.nasl,
+	scripts/gb_mandriva_MDVA_2011_002.nasl,
+	scripts/deb_2094_1.nasl,
+	scripts/xnews.nasl,
+	scripts/gb_ubuntu_USN_1249_1.nasl,
+	scripts/gb_mandriva_MDKSA_2007_204_1.nasl,
+	scripts/gb_mandriva_MDVSA_2010_156.nasl,
+	scripts/glsa_200408_24.nasl,
+	scripts/gb_CESA-2010_0165_nspr_centos4_i386.nasl,
+	scripts/articlelive_xss.nasl,
+	scripts/gb_fedora_2010_8558_quake3_fc12.nasl,
+	scripts/cutenews_dir_traversal.nasl,
+	scripts/webalbum_local_file_include.nasl,
+	scripts/fcore_2009_10751.nasl,
+	scripts/gb_solaris_121096_02.nasl,
+	scripts/glsa_200701_09.nasl,
+	scripts/freebsd_rockdodger.nasl,
+	scripts/gb_phptroubleticket_38486.nasl,
+	scripts/gb_hp_ux_HPSBUX00228.nasl,
+	scripts/gb_firefox_info_disc_vuln.nasl,
+	scripts/php_fusion_6_00_110.nasl,
+	scripts/gb_CESA-2009_0429_cups_centos5_i386.nasl,
+	scripts/gb_mandriva_MDKA_2007_071.nasl,
+	scripts/gb_fedora_2010_9479_dhcp_fc12.nasl,
+	scripts/gb_ubuntu_USN_511_1.nasl,
+	scripts/gb_ubuntu_USN_644_1.nasl,
+	scripts/gb_fedora_2011_13467_gnome-python2-extras_fc14.nasl,
+	scripts/mdksa_2009_179.nasl,
+	scripts/gb_mandriva_MDVSA_2010_008.nasl,
+	scripts/deb_604_1.nasl,
+	scripts/phpgroupware_html_injection.nasl,
+	scripts/gb_ubuntu_USN_561_1.nasl,
+	scripts/secpod_ibm_was_multiple_vuln_jul11.nasl,
+	scripts/gb_aphpkb_mult_xss_vuln.nasl,
+	scripts/gb_fedora_2011_11019_kernel_fc15.nasl,
+	scripts/gb_hp_ux_HPSBUX02623.nasl,
+	scripts/gb_RHSA-2008_0061-02_setroubleshoot.nasl,
+	scripts/gb_RHSA-2010_0625-01_wireshark.nasl,
+	scripts/freebsd_oftpd.nasl,
+	scripts/gb_fedora_2010_12911_DeviceKit-power_fc12.nasl,
+	scripts/gb_hp_ux_HPSBUX02458.nasl,
+	scripts/mdksa_2009_009.nasl,
+	scripts/secpod_blackberry_desktop_sec_bypass_vuln.nasl,
+	scripts/secpod_cyrus_imap_server_bof_vuln.nasl,
+	scripts/gb_mandriva_MDKSA_2007_221.nasl,
+	scripts/gb_fedora_2011_13181_bcfg2_fc14.nasl,
+	scripts/freebsd_pivotx.nasl,
+	scripts/deb_968_1.nasl,
+	scripts/deb_054_1.nasl,
+	scripts/fcore_2009_9911.nasl,
+	scripts/deb_2283_1.nasl,
+	scripts/fcore_2009_10285.nasl,
+	scripts/mdksa_2009_223_1.nasl,
+	scripts/secpod_spoonftp_retr_cmd_dos_vuln.nasl,
+	scripts/secpod_ibm_db2_detect_win_900218.nasl,
+	scripts/gb_RHSA-2008_0153-01_cups.nasl,
+	scripts/sles9p5013784.nasl,
+	scripts/http_trace.nasl,
+	scripts/secpod_3d_ftp_client_dir_traversal_vuln.nasl,
+	scripts/mdksa_2009_071.nasl,
+	scripts/afs_version.nasl,
+	scripts/freebsdsa_ipsec1.nasl,
+	scripts/glsa_201006_03.nasl,
+	scripts/gb_ubuntu_USN_457_1.nasl,
+	scripts/gb_CESA-2008_0196_unzip_centos3_x86_64.nasl,
+	scripts/freebsd_mpg123.nasl,
+	scripts/gb_novell_imanager_43635.nasl,
+	scripts/freebsd_de-netscape7.nasl,
+	scripts/gb_RHSA-2008_0192-01_cups.nasl,
+	scripts/glsa_200809_06.nasl,
+	scripts/icq_installed.nasl,
+	scripts/mdksa_2009_044.nasl,
+	scripts/ComicShout_sql_injection.nasl,
+	scripts/gb_solaris_126929_02.nasl,
+	scripts/gb_CESA-2008_0971_net-snmp_centos3_i386.nasl,
+	scripts/gb_gb_hp_openview_nnm_41829.nasl,
+	scripts/glsa_200911_03.nasl,
+	scripts/glsa_200903_07.nasl,
+	scripts/gb_fedora_2010_14268_fuse-encfs_fc13.nasl,
+	scripts/gb_ubuntu_USN_428_2.nasl,
+	scripts/gb_ubuntu_USN_404_1.nasl,
+	scripts/sambar_cgi_path_disclosure.nasl,
+	scripts/DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl,
+	scripts/gb_iwork_detect_macosx.nasl,
+	scripts/gb_ecms_43640.nasl,
+	scripts/gb_mandriva_MDVA_2008_070.nasl,
+	scripts/gb_freefloat_ftp_rest_cmd_bof_vuln.nasl,
+	scripts/glsa_200705_25.nasl,
+	scripts/freebsd_wordpress7.nasl,
+	scripts/gb_mandriva_MDVSA_2011_115.nasl,
+	scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl,
+	scripts/merak_multiple_vulns.nasl,
+	scripts/secpod_php_fusion_team_structure_sql_inj_vuln.nasl,
+	scripts/deb_520_1.nasl,
+	scripts/freebsd_php57.nasl,
+	scripts/freebsd_firefox46.nasl,
+	scripts/deb_2293_1.nasl,
+	scripts/gb_ubuntu_USN_1225_1.nasl,
+	scripts/ubuntu_862_1.nasl,
+	scripts/gb_ftpshell_server_bof_vuln.nasl,
+	scripts/gb_fedora_2007_018_avahi_fc5.nasl,
+	scripts/asterisk_37153.nasl,
+	scripts/glsa_200410_16.nasl,
+	scripts/fcore_2009_2128.nasl,
+	scripts/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl,
+	scripts/zabbix_37308.nasl,
+	scripts/icecast_slash_dos.nasl,
+	scripts/gb_vmware_prdts_mult_vuln_win01.nasl,
+	scripts/glsa_200711_27.nasl,
+	scripts/secpod_firefox_url_spoof_vuln_win.nasl,
+	scripts/freebsd_drupal1.nasl,
+	scripts/gb_ubuntu_USN_1164_1.nasl,
+	scripts/gb_CESA-2009_1561_libvorbis_centos5_i386.nasl,
+	scripts/sles9p5017442.nasl,
+	scripts/freebsdsa_openssl.nasl,
+	scripts/ubuntu_740_1.nasl,
+	scripts/gb_bind_43573.nasl,
+	scripts/secpod_tor_dir_queries_info_disc_vuln_win.nasl,
+	scripts/glsa_200804_28.nasl,
+	scripts/cisco_ios_ftp_server_auth_bypass.nasl,
+	scripts/fcore_2009_0814.nasl,
+	scripts/deb_2208_1.nasl,
+	scripts/deb_2144_1.nasl,
+	scripts/gb_mandriva_MDVA_2008_049.nasl,
+	scripts/gb_symantec_altiris_ns_detect.nasl,
+	scripts/sles9p5017619.nasl,
+	scripts/sles10_dhcp0.nasl,
+	scripts/gb_surge_ftp_server_admin_mult_xss_vuln.nasl,
+	scripts/secpod_jag_info_disc_vuln.nasl,
+	scripts/gb_fedora_2011_4244_nss_fc14.nasl,
+	scripts/freebsd_mpg1231.nasl,
+	scripts/glsa_200611_01.nasl,
+	scripts/glsa_200603_17.nasl,
+	scripts/deb_285_1.nasl,
+	scripts/gb_mandriva_MDKSA_2007_243.nasl,
+	scripts/gb_fedora_2008_8399_devhelp_fc8.nasl,
+	scripts/gb_CESA-2008_0135_tk_centos4_i386.nasl,
+	scripts/gb_fedora_2008_11743_mediawiki_fc10.nasl,
+	scripts/freebsd_id3lib.nasl,
+	scripts/gb_CESA-2010_0936_kernel_centos4_i386.nasl,
+	scripts/glsa_200702_01.nasl,
+	scripts/deb_228_1.nasl,
+	scripts/gb_opera_xss_vuln_lin.nasl,
+	scripts/gb_fedora_2007_3958_htdig_fc8.nasl,
+	scripts/gb_suse_2008_025.nasl,
+	scripts/gb_fedora_2007_0001_firefox_fc7.nasl,
+	scripts/gb_apple_safari_webkit_mult_vuln_mar10.nasl,
+	scripts/ovcesa2009_1139.nasl,
+	scripts/gb_ms10-009.nasl,
+	scripts/gb_fedora_2011_5200_kdeartwork_fc14.nasl,
+	scripts/freebsd_firefox0.nasl,
+	scripts/deb_292_3.nasl,
+	scripts/gb_wordpress_php_speedy_plugin_title_param_xss.nasl,
+	scripts/gb_opera_mult_vuln_oct08_lin.nasl,
+	scripts/secpod_free_directory_script_file_inclusion_vuln_900181.nasl,
+	scripts/count_cgi.nasl,
+	scripts/sles9p5041680.nasl,
+	scripts/gb_kaspersky_av_2010_dos_vuln.nasl,
+	scripts/gb_kerio_mailserver_xss_vuln_aug09.nasl,
+	scripts/secpod_dolphin_php_info_disc_vuln.nasl,
+	scripts/fcore_2009_10525.nasl,
+	scripts/gb_fedora_2010_14996_sudo_fc12.nasl,
+	scripts/secpod_google_chrome_mult_vuln_aug10.nasl,
+	scripts/glsa_200701_02.nasl,
+	scripts/gb_fedora_2007_3667_cacti_fc8.nasl,
+	scripts/groupwise_web_interface_htmlver_hole.nasl,
+	scripts/sles10_openssl0.nasl,
+	scripts/deb_765_1.nasl,
+	scripts/gb_ubuntu_USN_1113_1.nasl,
+	scripts/enterasys_dragon_reporting_detect.nasl,
+	scripts/gb_mandriva_MDKSA_2007_245.nasl,
+	scripts/gb_solaris_119450_01.nasl,
+	scripts/gb_mandriva_MDVSA_2010_042.nasl,
+	scripts/glsa_200712_25.nasl,
+	scripts/freebsd_otrs2.nasl,
+	scripts/freebsd_png0.nasl,
+	scripts/secpod_sun_java_dir_server_info_disc_vuln_lin.nasl,
+	scripts/ubuntu_735_1.nasl,
+	scripts/deb_1698_1.nasl,
+	scripts/fcore_2009_5552.nasl,
+	scripts/cfengine_format_string_vuln.nasl,
+	scripts/gb_CESA-2008_0131_netpbm_centos4_x86_64.nasl,
+	scripts/deb_1909_1.nasl,
+	scripts/gb_solaris_126365_15.nasl,
+	scripts/gb_MediaWiki_42024.nasl,
+	scripts/fcore_2009_6166.nasl,
+	scripts/gb_CESA-2010_0967_seamonkey_centos4_i386.nasl,
+	scripts/gb_solaris_121104_10.nasl,
+	scripts/gb_fedora_2008_8282_rubygem-activerecord_fc8.nasl,
+	scripts/gb_my_news_49818.nasl,
+	scripts/deb_1844_1.nasl,
+	scripts/gb_fedora_2010_4321_cpio_fc12.nasl,
+	scripts/fcore_2009_3405.nasl,
+	scripts/RHSA_2009_1101.nasl,
+	scripts/secpod_google_chrome_mult_vuln_mar11_lin.nasl,
+	scripts/gb_mandriva_MDVSA_2008_229.nasl,
+	scripts/gb_fedora_2011_13465_gnome-python2-extras_fc15.nasl,
+	scripts/gb_hp_ux_HPSBUX00169.nasl,
+	scripts/glsa_200405_07.nasl,
+	scripts/kerio_wrf_management_detection.nasl,
+	scripts/gb_mandriva_MDKA_2007_029_1.nasl,
+	scripts/gb_fedora_2008_9667_evolution-rss_fc8.nasl,
+	scripts/freebsd_py24-pylons.nasl,
+	scripts/gb_yahoo_msg_detect.nasl,
+	scripts/secpod_joomla_com_jresearch_lfi_vuln.nasl,
+	scripts/glsa_200701_17.nasl:
+	Updated script metadata (changes for CR56).
+
+2011-11-3  Henri Doreau <henri.doreau at greenbone.net>
+
 	* scripts/iis_propfind2.nasl,
 	scripts/gb_php_grapheme_extract_dos_vuln.nasl,
 	scripts/fcore_2009_0917.nasl,

Modified: trunk/openvas-plugins/scripts/ComicShout_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ComicShout_sql_injection.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/ComicShout_sql_injection.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,6 +28,8 @@
 {
  script_id(100044);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-16 12:53:50 +0100 (Mon, 16 Mar 2009)");
  script_bugtraq_id(29464);
  script_cve_id("CVE-2008-6425");
  script_tag(name:"cvss_base", value:"7.5");
@@ -48,10 +50,8 @@
   ComicShout 2.8 is vulnerable; other versions may also be affected. 
 
  See also:
-  http://www.securityfocus.com/bid/29464
+  http://www.securityfocus.com/bid/29464";
 
- Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if ComicShout 'news.php' is vulnerable to SQL Injection");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
 	script_id(10994);
 	script_version("$Revision$");
+	script_tag(name:"last_modification", value:"$Date$");
+	script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 	script_bugtraq_id(2083, 2651);
     script_tag(name:"cvss_base", value:"7.5");
     script_tag(name:"risk_factor", value:"High");
@@ -53,8 +55,7 @@
 
 Solution:
 Download the latest patch from
-http://ipswitch.com/support/IMail/patch-upgrades.html
-Risk factor: High";
+http://ipswitch.com/support/IMail/patch-upgrades.html";
 
 	script_description(desc);
  	summary = "IPSwitch IMail SMTP Buffer Overflow";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1055.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1055.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1055.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64017);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-25 20:59:33 +0200 (Mon, 25 May 2009)");
  script_cve_id("CVE-2009-0065");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -74,10 +76,8 @@
 
 http://rhn.redhat.com/errata/RHSA-2009-1055.html
 http://www.redhat.com/security/updates/classification/#important
-http://kbase.redhat.com/faq/docs/DOC-16788
+http://kbase.redhat.com/faq/docs/DOC-16788";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:1055";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1101.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64211);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-23 15:49:15 +0200 (Tue, 23 Jun 2009)");
  script_cve_id("CVE-2004-2541", "CVE-2006-4262", "CVE-2009-0148", "CVE-2009-1577");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -55,10 +57,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1101.html
-http://www.redhat.com/security/updates/classification/#moderate
+http://www.redhat.com/security/updates/classification/#moderate";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:1101";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1431.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64833);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-15 22:46:32 +0200 (Tue, 15 Sep 2009)");
  script_cve_id("CVE-2009-2654", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -72,10 +74,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1431.html
-http://www.redhat.com/security/updates/classification/#critical
+http://www.redhat.com/security/updates/classification/#critical";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1431");

Modified: trunk/openvas-plugins/scripts/afs_version.nasl
===================================================================
--- trunk/openvas-plugins/scripts/afs_version.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/afs_version.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,6 +26,8 @@
 {
   script_id(10441);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"Low");
   name = "AFS client version";
   script_name(name);
@@ -37,10 +39,8 @@
 system they are attacking. Versions and types should be omitted
 where possible.
 
-Solution: None.
+Solution: None.";
 
-Risk factor : Low";
-
   script_description(desc);
 
   summary = "AFS client version";

Modified: trunk/openvas-plugins/scripts/amanda_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/amanda_detect.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/amanda_detect.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -25,6 +25,8 @@
 if(description) {
     script_id(10462);
     script_version("$Revision$");
+    script_tag(name:"last_modification", value:"$Date$");
+    script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
     script_tag(name:"risk_factor", value:"Low");
  
     name = "Amanda client version";
@@ -32,10 +34,8 @@
  
     desc = "This detects the Amanda backup system client
 version. The client version gives potential attackers additional
-information about the system they are attacking.
+information about the system they are attacking.";
 
-Risk factor : Low";
-
     script_description(desc);
  
     summary = "Detect Amanda client version";

Modified: trunk/openvas-plugins/scripts/articlelive_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/articlelive_xss.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/articlelive_xss.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(17612);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2005-0881");

Modified: trunk/openvas-plugins/scripts/asterisk_37153.nasl
===================================================================
--- trunk/openvas-plugins/scripts/asterisk_37153.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/asterisk_37153.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,6 +28,8 @@
 {
  script_id(100366);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-01 12:01:39 +0100 (Tue, 01 Dec 2009)");
  script_bugtraq_id(37153);
  script_cve_id("CVE-2009-4055");
  script_tag(name:"cvss_base", value:"5.0");
@@ -48,10 +50,8 @@
 References:
 http://www.securityfocus.com/bid/37153
 http://www.asterisk.org/
-http://downloads.asterisk.org/pub/security/AST-2009-010.html
+http://downloads.asterisk.org/pub/security/AST-2009-010.html";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine the Asterisk version");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/avirt_gateway_telnet.nasl
===================================================================
--- trunk/openvas-plugins/scripts/avirt_gateway_telnet.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/avirt_gateway_telnet.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,6 +26,8 @@
 {
  script_id(11096);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(3901);
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -39,8 +41,7 @@
 
 An attacker may use this flaw to get access on your system.
 
-Solution : Contact your vendor for a patch or disable this service
-Risk factor : High";
+Solution : Contact your vendor for a patch or disable this service";
 
 	 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/badblue_null_byte.nasl
===================================================================
--- trunk/openvas-plugins/scripts/badblue_null_byte.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/badblue_null_byte.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(11064);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(5226);
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -42,8 +44,7 @@
 A cracker may exploit this vulnerability to steal the passwords.
 
 
-Solution : upgrade your software or protect it with a filtering reverse proxy
-Risk factor: Medium";
+Solution : upgrade your software or protect it with a filtering reverse proxy";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/cfengine_format_string_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cfengine_format_string_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/cfengine_format_string_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,6 +28,8 @@
 {
  script_id(14316);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(1757);
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -48,10 +50,8 @@
 execute arbitrary code on the stack.  In the latter case, the code would
 be executed as the 'root' user.
 
-Solution: Upgrade to 1.6.0a11 or newer
+Solution: Upgrade to 1.6.0a11 or newer";
 
-Risk factor: Critical";
-
  script_description(desc);
  
  summary = "check for cfengine flaw based on its version";

Modified: trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/cisco_ios_ftp_server_auth_bypass.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -50,6 +50,8 @@
 if (description) {
  script_id(9999996);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-08-22 16:09:14 +0200 (Fri, 22 Aug 2008)");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_cve_id("CVE-2007-2586");

Modified: trunk/openvas-plugins/scripts/count_cgi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/count_cgi.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/count_cgi.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,6 +26,8 @@
 {
  script_id(10049);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(128);
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -40,11 +42,9 @@
 
 ** Note that OpenVAS only checked the version number 
 
-Solution : upgrade to wwwcount 2.4 or later.
+Solution : upgrade to wwwcount 2.4 or later.";
 
-Risk factor : High";
 
-
  script_description(desc);
  
  summary = "Checks Count.cgi version";

Modified: trunk/openvas-plugins/scripts/cs_whois_34700.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cs_whois_34700.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/cs_whois_34700.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -37,14 +37,14 @@
   the computer. 
 
  See also:
-  http://www.securityfocus.com/bid/34700
+  http://www.securityfocus.com/bid/34700";
 
- Risk factor : High";
-
 if (description)
 {
  script_id(100166);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-26 20:59:36 +0200 (Sun, 26 Apr 2009)");
  script_bugtraq_id(34700);
  script_tag(name:"risk_factor", value:"High");
 

Modified: trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/cutenews_dir_traversal.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
   script_id(20137);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
   script_cve_id("CVE-2005-3507");
   script_bugtraq_id(15295);
   script_xref(name:"OSVDB", value:"20472");

Modified: trunk/openvas-plugins/scripts/db2_discovery_DoS.nasl
===================================================================
--- trunk/openvas-plugins/scripts/db2_discovery_DoS.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/db2_discovery_DoS.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -32,6 +32,8 @@
 {
  script_id(11896);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2003-0827");
@@ -46,10 +48,8 @@
 continuously, preventing you from working properly.
 
 
-Solution: upgrade your software - apply FixPack 10a
+Solution: upgrade your software - apply FixPack 10a";
 
-Risk factor: Medium";
-
  script_description(desc);
  
  summary = "A too long UDP packet kills the remote service";

Modified: trunk/openvas-plugins/scripts/deb_022_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_022_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_022_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53785);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 022-1 (exmh)";
  script_name(name);
@@ -45,10 +47,8 @@
 We recommend you upgrade your exmh packages immediately.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20022-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20022-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 022-1 (exmh)";

Modified: trunk/openvas-plugins/scripts/deb_054_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_054_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_054_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53566);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 054-1 (cron)";
  script_name(name);
@@ -43,10 +45,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20054-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20054-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 054-1 (cron)";

Modified: trunk/openvas-plugins/scripts/deb_1021_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1021_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1021_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(56526);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(14379);
  script_cve_id("CVE-2005-2471");
  script_tag(name:"cvss_base", value:"7.5");
@@ -55,10 +57,8 @@
 We recommend that you upgrade your netpbm package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201021-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201021-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1021-1 (netpbm-free)";

Modified: trunk/openvas-plugins/scripts/deb_103_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_103_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_103_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53837);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 103-1 (glibc)";
  script_name(name);
@@ -42,10 +44,8 @@
 you upgrade your libc package immediately.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20103-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20103-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 103-1 (glibc)";

Modified: trunk/openvas-plugins/scripts/deb_1306_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1306_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1306_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(58353);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-1362", "CVE-2007-2867", "CVE-2007-2868", "CVE-2007-2869", "CVE-2007-2870", "CVE-2007-2871");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -83,10 +85,8 @@
 We recommend that you upgrade your xulrunner packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201306-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201306-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1306-1 (xulrunner)";

Modified: trunk/openvas-plugins/scripts/deb_1431_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1431_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1431_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(60010);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-6183");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your ruby-gnome2 package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201431-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201431-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1431-1 (ruby-gnome2)";

Modified: trunk/openvas-plugins/scripts/deb_1636_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1636_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1636_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,6 +28,8 @@
 {
  script_id(61594);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-17 04:23:15 +0200 (Wed, 17 Sep 2008)");
  script_cve_id("CVE-2008-3272", "CVE-2008-3275", "CVE-2008-3276", "CVE-2008-3526", "CVE-2008-3534", "CVE-2008-3535", "CVE-2008-3792", "CVE-2008-3915");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -46,10 +48,8 @@
 We recommend that you upgrade your linux-2.6.24 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201636-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201636-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1636-1 (linux-2.6.24)";

Modified: trunk/openvas-plugins/scripts/deb_1698_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1698_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1698_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(63145);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-13 22:38:32 +0100 (Tue, 13 Jan 2009)");
  script_cve_id("CVE-2008-2381");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your gforge package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201698-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201698-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1698-1 (gforge)";

Modified: trunk/openvas-plugins/scripts/deb_1829_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1829_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1829_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64416);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)");
  script_cve_id("CVE-2009-2360");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -58,10 +60,8 @@
 We recommend that you upgrade your sork-passwd-h3 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201829-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201829-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1829-1 (sork-passwd-h3)";

Modified: trunk/openvas-plugins/scripts/deb_1844_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1844_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1844_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64555);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-1385", "CVE-2009-1389", "CVE-2009-1630", "CVE-2009-1633", "CVE-2009-1895", "CVE-2009-1914", "CVE-2009-1961", "CVE-2009-2406", "CVE-2009-2407");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -101,10 +103,8 @@
 We recommend that you upgrade your linux-2.6.24 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201844-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201844-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1844-1 (linux-2.6.24)");

Modified: trunk/openvas-plugins/scripts/deb_1909_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1909_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_1909_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(66057);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)");
  script_cve_id("CVE-2009-2943");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -64,10 +66,8 @@
 We recommend that you upgrade your postgresql-ocaml packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201909-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201909-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1909-1 (postgresql-ocaml)");

Modified: trunk/openvas-plugins/scripts/deb_2094_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2094_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_2094_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(67981);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-10-10 19:35:00 +0200 (Sun, 10 Oct 2010)");
  script_tag(name:"cvss_base", value:"10.0");
  script_cve_id("CVE-2009-4895", "CVE-2010-2226", "CVE-2010-2240", "CVE-2010-2248", "CVE-2010-2521", "CVE-2010-2798", "CVE-2010-2803", "CVE-2010-2959", "CVE-2010-3015");
  script_tag(name:"risk_factor", value:"Critical");
@@ -104,10 +106,8 @@
 We recommend that you upgrade your linux-2.6 and user-mode-linux
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202094-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202094-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2094-1 (linux-2.6)");

Modified: trunk/openvas-plugins/scripts/deb_2144_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2144_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_2144_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(68985);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-07 16:04:02 +0100 (Mon, 07 Mar 2011)");
  script_tag(name:"cvss_base", value:"9.3");
  script_cve_id("CVE-2010-4538");
  script_tag(name:"risk_factor", value:"Critical");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your wireshark packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202144-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202144-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2144-1 (wireshark)");

Modified: trunk/openvas-plugins/scripts/deb_2177_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2177_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_2177_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(69112);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"7.5");
   script_cve_id("CVE-2011-0432");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 
 We recommend that you upgrade your python-webdav packages.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202177-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202177-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2177-1 (pywebdav)");

Modified: trunk/openvas-plugins/scripts/deb_2208_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2208_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_2208_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(69418);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)");
  script_tag(name:"cvss_base", value:"7.1");
  script_cve_id("CVE-2011-0414");
  script_tag(name:"risk_factor", value:"High");
@@ -67,10 +69,8 @@
 We recommend that you upgrade your bind9 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202208-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202208-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2208-1 (bind9)");

Modified: trunk/openvas-plugins/scripts/deb_2283_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2283_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_2283_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(70057);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-07 17:37:07 +0200 (Sun, 07 Aug 2011)");
  script_cve_id("CVE-2011-1526");
  script_tag(name:"risk_factor", value:"High");
  script_tag(name:"cvss_base", value:"6.5");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your krb5-appl packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202283-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202283-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2283-1 (krb5-appl)");

Modified: trunk/openvas-plugins/scripts/deb_228_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_228_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_228_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53310);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-0031", "CVE-2003-0032");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -63,10 +65,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20228-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20228-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 228-1 (libmcrypt)";

Modified: trunk/openvas-plugins/scripts/deb_2293_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2293_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_2293_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(70229);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)");
  script_tag(name:"cvss_base", value:"9.3");
  script_cve_id("CVE-2011-2895");
  script_tag(name:"risk_factor", value:"Critical");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your libxfont packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202293-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202293-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2293-1 (libxfont)");

Modified: trunk/openvas-plugins/scripts/deb_285_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_285_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_285_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53356);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-0136");
  script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
@@ -56,10 +58,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20285-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20285-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 285-1 (lprng)";

Modified: trunk/openvas-plugins/scripts/deb_292_3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_292_3.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_292_3.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53367);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 292-3 (mime-support)";
  script_name(name);
@@ -59,10 +61,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20292-3
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20292-3";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 292-3 (mime-support)";

Modified: trunk/openvas-plugins/scripts/deb_520_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_520_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_520_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53210);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(10448);
  script_cve_id("CVE-2004-0523");
  script_tag(name:"cvss_base", value:"10.0");
@@ -54,10 +56,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20520-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20520-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 520-1 (krb5)";

Modified: trunk/openvas-plugins/scripts/deb_604_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_604_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_604_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53292);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(11800);
  script_cve_id("CVE-2004-0993");
  script_tag(name:"cvss_base", value:"10.0");
@@ -51,10 +53,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20604-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20604-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 604-1 (hpsockd)";

Modified: trunk/openvas-plugins/scripts/deb_626_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_626_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_626_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(53465);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(12173);
  script_cve_id("CVE-2004-1183");
  script_tag(name:"cvss_base", value:"5.1");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20626-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20626-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 626-1 (tiff)";

Modified: trunk/openvas-plugins/scripts/deb_765_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_765_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_765_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(54444);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(12918);
  script_cve_id("CVE-2005-0469");
  script_tag(name:"cvss_base", value:"7.5");
@@ -54,10 +56,8 @@
 We recommend that you upgrade your heimdal package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20765-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20765-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 765-1 (heimdal)";

Modified: trunk/openvas-plugins/scripts/deb_968_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_968_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/deb_968_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,6 +27,8 @@
 {
  script_id(56274);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(16610);
  script_cve_id("CVE-2005-3342");
  script_tag(name:"cvss_base", value:"1.2");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your nowebm package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20968-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20968-1";
 
-Risk factor: Low";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 968-1 (noweb)";

Modified: trunk/openvas-plugins/scripts/enterasys_dragon_reporting_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/enterasys_dragon_reporting_detect.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/enterasys_dragon_reporting_detect.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,6 +26,8 @@
 {
  script_id(18532);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"None");
  
  name = "Enterasys Dragon Enterprise Reporting detection";
@@ -34,10 +36,8 @@
  
  desc = "
 The remote host is running the Enterasys Dragon Enterprise Reporting on
-this port.
+this port.";
 
-Risk factor : None";
-
  script_description(desc);
  
  summary = "Checks for Enterasys Dragon Enterprise Reporting console";

Modified: trunk/openvas-plugins/scripts/fcore_2008_10755.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2008_10755.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2008_10755.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(63130);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-07 23:16:01 +0100 (Wed, 07 Jan 2009)");
  script_cve_id("CVE-2008-1078");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
@@ -57,10 +59,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-10755
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-10755";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2008-10755 (am-utils)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_0814.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0814.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_0814.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(63260);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)");
  script_cve_id("CVE-2008-5153", "CVE-2008-4796");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -61,10 +63,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0814
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0814";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-0814 (moodle)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_10285.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10285.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_10285.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(66037);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)");
  script_cve_id("CVE-2009-2957", "CVE-2009-2958");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -60,10 +62,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10285
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10285";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-10285 (dnsmasq)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_10525.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10525.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_10525.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(66048);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)");
  script_cve_id("CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1895", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079", "CVE-2009-2909", "CVE-2009-2910");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10525
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10525";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-10525 (kernel)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_10751.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10751.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_10751.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(66322);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-03 22:10:42 +0100 (Thu, 03 Dec 2009)");
  script_cve_id("CVE-2009-3641");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10751
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10751";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-10751 (snort)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_2128.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2128.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_2128.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(63463);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)");
  script_cve_id("CVE-2009-0040", "CVE-2008-1382");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -61,10 +63,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2128
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2128";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-2128 (libpng)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_3405.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3405.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_3405.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(63773);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_cve_id("CVE-2009-1213");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -65,10 +67,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3405
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3405";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-3405 (bugzilla)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_5552.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5552.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_5552.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64101);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2009-1373", "CVE-2009-1374", "CVE-2009-1375", "CVE-2009-1376", "CVE-2008-2927");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -67,10 +69,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5552
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5552";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-5552 (pidgin)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_6166.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_6166.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_6166.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64396);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)");
  script_cve_id("CVE-2009-0945");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -78,10 +80,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6166
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-6166";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 11 FEDORA-2009-6166 (webkitgtk)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_8789.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8789.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_8789.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(64710);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-8789 (kobo)");
 
@@ -42,10 +44,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8789
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8789";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-8789 (kobo)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_9911.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9911.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/fcore_2009_9911.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(65741);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-9911 (thunderbird)");
 
@@ -47,10 +49,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9911
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9911";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-9911 (thunderbird)");

Modified: trunk/openvas-plugins/scripts/freebsd_asterisk141.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_asterisk141.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_asterisk141.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(69591);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)");
  script_tag(name:"cvss_base", value:"5.0");
   script_cve_id("CVE-2011-1507");
  script_tag(name:"risk_factor", value:"Medium");
@@ -57,10 +59,8 @@
 
 http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
 http://downloads.asterisk.org/pub/security/AST-2011-006.pdf
-http://www.vuxml.org/freebsd/3c7d565a-6c64-11e0-813a-6c626dd55a41.html
+http://www.vuxml.org/freebsd/3c7d565a-6c64-11e0-813a-6c626dd55a41.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: asterisk14");

Modified: trunk/openvas-plugins/scripts/freebsd_awstats.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_awstats.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_awstats.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(52186);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0362", "CVE-2005-0363", "CVE-2005-0435", "CVE-2005-0436", "CVE-2005-0437", "CVE-2005-0438");
  script_bugtraq_id(12543,12545);
  script_tag(name:"cvss_base", value:"7.5");
@@ -77,10 +79,8 @@
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488
 http://packetstormsecurity.nl/0501-exploits/AWStatsVulnAnalysis.pdf
 http://marc.theaimsgroup.com/?l=bugtraq&m=110840530924124
-http://www.vuxml.org/freebsd/fdad8a87-7f94-11d9-a9e7-0001020eed82.html
+http://www.vuxml.org/freebsd/fdad8a87-7f94-11d9-a9e7-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: awstats";

Modified: trunk/openvas-plugins/scripts/freebsd_de-netscape7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_de-netscape7.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_de-netscape7.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(52235);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12131);
  script_cve_id("CVE-2004-1316");
  script_tag(name:"cvss_base", value:"5.0");
@@ -71,10 +73,8 @@
 
 http://isec.pl/vulnerabilities/isec-0020-mozilla.txt
 http://marc.theaimsgroup.com/?l=bugtraq&m=110436284718949
-http://www.vuxml.org/freebsd/3fbf9db2-658b-11d9-abad-000a95bc6fae.html
+http://www.vuxml.org/freebsd/3fbf9db2-658b-11d9-abad-000a95bc6fae.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "mozilla -- heap overflow in NNTP handler";

Modified: trunk/openvas-plugins/scripts/freebsd_drupal1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_drupal1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_drupal1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(56452);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: drupal";
  script_name(name);
@@ -46,10 +48,8 @@
 http://drupal.org/node/53805
 http://drupal.org/node/53803
 http://drupal.org/node/53796
-http://www.vuxml.org/freebsd/6779e82f-b60b-11da-913d-000ae42e9b93.html
+http://www.vuxml.org/freebsd/6779e82f-b60b-11da-913d-000ae42e9b93.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: drupal";

Modified: trunk/openvas-plugins/scripts/freebsd_firefox0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox0.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_firefox0.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(52134);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: firefox";
  script_name(name);
@@ -74,10 +76,8 @@
 software upgrades.
 
 http://www.mozilla.org/security/announce/mfsa2005-41.html
-http://www.vuxml.org/freebsd/f650d5b8-ae62-11d9-a788-0001020eed82.html
+http://www.vuxml.org/freebsd/f650d5b8-ae62-11d9-a788-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: firefox";

Modified: trunk/openvas-plugins/scripts/freebsd_firefox46.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox46.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_firefox46.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(67297);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-04-21 03:31:17 +0200 (Wed, 21 Apr 2010)");
  script_cve_id("CVE-2010-1121");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://www.mozilla.org/security/announce/2010/mfsa2010-25.html
-http://www.vuxml.org/freebsd/ec8f449f-40ed-11df-9edc-000f20797ede.html
+http://www.vuxml.org/freebsd/ec8f449f-40ed-11df-9edc-000f20797ede.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: firefox");

Modified: trunk/openvas-plugins/scripts/freebsd_gtetrinet.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gtetrinet.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_gtetrinet.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(57325);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-3125");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -45,10 +47,8 @@
 software upgrades.
 
 http://www.debian.org/security/2006/dsa-1163
-http://www.vuxml.org/freebsd/0b79743b-3ab7-11db-81e1-000e0c2e438a.html
+http://www.vuxml.org/freebsd/0b79743b-3ab7-11db-81e1-000e0c2e438a.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: gtetrinet";

Modified: trunk/openvas-plugins/scripts/freebsd_hplip.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_hplip.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_hplip.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(61956);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-12-03 18:25:22 +0100 (Wed, 03 Dec 2008)");
  script_cve_id("CVE-2008-2940", "CVE-2008-2941");
  script_bugtraq_id(30683);
  script_tag(name:"cvss_base", value:"7.2");
@@ -61,10 +63,8 @@
 
 https://rhn.redhat.com/errata/RHSA-2008-0818.html
 http://secunia.com/advisories/31470
-http://www.vuxml.org/freebsd/37940643-be1b-11dd-a578-0030843d3802.html
+http://www.vuxml.org/freebsd/37940643-be1b-11dd-a578-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: hplip";

Modified: trunk/openvas-plugins/scripts/freebsd_id3lib.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_id3lib.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_id3lib.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(58790);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-4460");
  script_bugtraq_id(25372);
  script_tag(name:"cvss_base", value:"7.2");
@@ -45,11 +47,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: id3lib";

Modified: trunk/openvas-plugins/scripts/freebsd_maradns.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_maradns.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_maradns.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(60148);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2008-0061");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -52,10 +54,8 @@
 
 http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html
 http://secunia.com/advisories/28329
-http://www.vuxml.org/freebsd/f358de71-bf64-11dc-928b-0016179b2dd5.html
+http://www.vuxml.org/freebsd/f358de71-bf64-11dc-928b-0016179b2dd5.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: maradns";

Modified: trunk/openvas-plugins/scripts/freebsd_mpg123.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mpg123.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_mpg123.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(52236);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12218);
  script_cve_id("CVE-2004-0991");
  script_tag(name:"cvss_base", value:"7.5");
@@ -50,11 +52,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mpg123, mpg123-nas, mpg123-esound";

Modified: trunk/openvas-plugins/scripts/freebsd_mpg1231.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mpg1231.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_mpg1231.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(52330);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0982");
  script_bugtraq_id(11468);
  script_tag(name:"cvss_base", value:"10.0");
@@ -55,10 +57,8 @@
 software upgrades.
 
 http://marc.theaimsgroup.com/?l=bugtraq&m=109834486312407
-http://www.vuxml.org/freebsd/20d16518-2477-11d9-814e-0001020eed82.html
+http://www.vuxml.org/freebsd/20d16518-2477-11d9-814e-0001020eed82.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mpg123, mpg123-nas, mpg123-esound";

Modified: trunk/openvas-plugins/scripts/freebsd_nbsmtp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_nbsmtp.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_nbsmtp.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(54460);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: nbsmtp";
  script_name(name);
@@ -43,10 +45,8 @@
 software upgrades.
 
 http://people.freebsd.org/~niels/issues/nbsmtp-20050726.txt
-http://www.vuxml.org/freebsd/debbb39c-fdb3-11d9-a30d-00b0d09acbfc.html
+http://www.vuxml.org/freebsd/debbb39c-fdb3-11d9-a30d-00b0d09acbfc.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: nbsmtp";

Modified: trunk/openvas-plugins/scripts/freebsd_oftpd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_oftpd.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_oftpd.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(52487);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0376");
  script_bugtraq_id(9980);
  script_tag(name:"cvss_base", value:"5.0");
@@ -50,10 +52,8 @@
 software upgrades.
 
 http://www.time-travellers.org/oftpd/oftpd-dos.html
-http://www.vuxml.org/freebsd/290d81b9-80f1-11d8-9645-0020ed76ef5a.html
+http://www.vuxml.org/freebsd/290d81b9-80f1-11d8-9645-0020ed76ef5a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: oftpd";

Modified: trunk/openvas-plugins/scripts/freebsd_openssl4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openssl4.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_openssl4.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(70248);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)");
  script_tag(name:"cvss_base", value:"5.0");
- script_version("$Revision$");
  script_cve_id("CVE-2011-3207", "CVE-2011-3210");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("FreeBSD Ports: openssl");
@@ -45,10 +47,8 @@
 software upgrades.
 
 http://www.openssl.org/news/secadv_20110906.txt
-http://www.vuxml.org/freebsd/2ecb7b20-d97e-11e0-b2e2-00215c6a37bb.html
+http://www.vuxml.org/freebsd/2ecb7b20-d97e-11e0-b2e2-00215c6a37bb.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: openssl");

Modified: trunk/openvas-plugins/scripts/freebsd_otrs2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_otrs2.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_otrs2.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(70260);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)");
  script_tag(name:"cvss_base", value:"4.0");
  script_cve_id("CVE-2011-2746");
  script_tag(name:"risk_factor", value:"Medium");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://otrs.org/advisory/OSA-2011-03-en/
-http://www.vuxml.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html
+http://www.vuxml.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: otrs");

Modified: trunk/openvas-plugins/scripts/freebsd_php57.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php57.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_php57.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(68689);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2006-7243", "CVE-2010-2950", "CVE-2010-3436", "CVE-2010-3709", "CVE-2010-4150");
  script_tag(name:"risk_factor", value:"High");
@@ -71,11 +73,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: php5");

Modified: trunk/openvas-plugins/scripts/freebsd_pivotx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pivotx.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_pivotx.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(68941);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-05 22:25:39 +0100 (Sat, 05 Mar 2011)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2011-1035");
  script_tag(name:"risk_factor", value:"High");
@@ -46,11 +48,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: pivotx");

Modified: trunk/openvas-plugins/scripts/freebsd_png0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_png0.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_png0.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(58784);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-5267", "CVE-2007-5266", "CVE-2007-5268", "CVE-2007-5269");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -48,10 +50,8 @@
 
 http://secunia.com/advisories/27093/
 http://secunia.com/advisories/27130/
-http://www.vuxml.org/freebsd/172acf78-780c-11dc-b3f4-0016179b2dd5.html
+http://www.vuxml.org/freebsd/172acf78-780c-11dc-b3f4-0016179b2dd5.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: png";

Modified: trunk/openvas-plugins/scripts/freebsd_py24-pylons.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_py24-pylons.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_py24-pylons.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(61252);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: py24-pylons";
  script_name(name);
@@ -43,10 +45,8 @@
 software upgrades.
 
 http://wiki.pylonshq.com/display/pylonsdocs/0.9.6.2
-http://www.vuxml.org/freebsd/f5c58fc1-49c0-11dd-b0ba-00163e000016.html
+http://www.vuxml.org/freebsd/f5c58fc1-49c0-11dd-b0ba-00163e000016.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: py24-pylons";

Modified: trunk/openvas-plugins/scripts/freebsd_rockdodger.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_rockdodger.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_rockdodger.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(52285);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: rockdodger";
  script_name(name);
@@ -50,10 +52,8 @@
 software upgrades.
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278878
-http://www.vuxml.org/freebsd/2b4d5288-447e-11d9-9ebb-000854d03344.html
+http://www.vuxml.org/freebsd/2b4d5288-447e-11d9-9ebb-000854d03344.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: rockdodger";

Modified: trunk/openvas-plugins/scripts/freebsd_wireshark.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_wireshark.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_wireshark.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
  script_id(58832);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "wireshark -- Multiple problems";
  script_name(name);
@@ -52,10 +54,8 @@
 
 http://secunia.com/advisories/25833/
 http://www.wireshark.org/security/wnpa-sec-2007-02.html
-http://www.vuxml.org/freebsd/7fadc049-2ba0-11dc-9377-0016179b2dd5.html
+http://www.vuxml.org/freebsd/7fadc049-2ba0-11dc-9377-0016179b2dd5.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "wireshark -- Multiple problems";

Modified: trunk/openvas-plugins/scripts/freebsd_wordpress7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_wordpress7.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsd_wordpress7.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,6 +30,8 @@
 {
  script_id(61620);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-17 04:23:15 +0200 (Wed, 17 Sep 2008)");
  script_cve_id("CVE-2008-4106");
  script_bugtraq_id(31068);
  script_tag(name:"cvss_base", value:"5.1");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://wordpress.org/development/2008/09/wordpress-262/
-http://www.vuxml.org/freebsd/884fced7-7f1c-11dd-a66a-0019666436c2.html
+http://www.vuxml.org/freebsd/884fced7-7f1c-11dd-a66a-0019666436c2.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: wordpress, de-wordpress";

Modified: trunk/openvas-plugins/scripts/freebsdsa_ipsec1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_ipsec1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsdsa_ipsec1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -31,6 +31,8 @@
 {
  script_id(56454);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(17191);
  script_cve_id("CVE-2006-0905");
  script_tag(name:"cvss_base", value:"7.5");
@@ -59,8 +61,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:11.ipsec.asc
-Risk factor : High";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:11.ipsec.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_openssl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_openssl.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/freebsdsa_openssl.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -31,6 +31,8 @@
 {
  script_id(52641);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Security Advisory (FreeBSD-SA-03:18.openssl.asc)";
  script_name(name);
@@ -78,8 +80,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-03:18.openssl.asc
-Risk factor : High";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-03:18.openssl.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0131_netpbm_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0131_netpbm_centos4_x86_64.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0131_netpbm_centos4_x86_64.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880210);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0131");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-February/014734.html
+  http://lists.centos.org/pipermail/centos-announce/2008-February/014734.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of netpbm");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0131_netpbm_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0135_tk_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0135_tk_centos4_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0135_tk_centos4_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880074);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0135");
@@ -59,10 +61,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-February/014699.html
+  http://lists.centos.org/pipermail/centos-announce/2008-February/014699.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of tk");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0135_tk_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0196_unzip_centos3_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0196_unzip_centos3_x86_64.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0196_unzip_centos3_x86_64.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880298);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0196");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-March/014757.html
+  http://lists.centos.org/pipermail/centos-announce/2008-March/014757.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of unzip");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0196_unzip_centos3_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0971_net-snmp_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0971_net-snmp_centos3_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0971_net-snmp_centos3_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880007);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "CESA", value: "2008:0971");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-November/015367.html
+  http://lists.centos.org/pipermail/centos-announce/2008-November/015367.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of net-snmp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0971_net-snmp_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0429_cups_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0429_cups_centos5_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0429_cups_centos5_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880766);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:0429");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0429_cups_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_1561_libvorbis_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_1561_libvorbis_centos5_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_1561_libvorbis_centos5_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880793);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2009:1561");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_1561_libvorbis_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0165_nspr_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0165_nspr_centos4_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0165_nspr_centos4_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880382);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-31 14:20:46 +0200 (Wed, 31 Mar 2010)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2010:0165");
@@ -73,10 +75,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2010-March/016607.html
+  http://lists.centos.org/pipermail/centos-announce/2010-March/016607.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of nspr");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0165_nspr_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0173_openssl096b_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0173_openssl096b_centos4_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0173_openssl096b_centos4_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880384);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-31 14:20:46 +0200 (Wed, 31 Mar 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0173");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2010-March/016611.html
+  http://lists.centos.org/pipermail/centos-announce/2010-March/016611.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openssl096b");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0173_openssl096b_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880655);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "CESA", value: "2010:0518");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0889_freetype_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0889_freetype_centos5_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0889_freetype_centos5_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880568);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2010:0889");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0889_freetype_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0936_kernel_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0936_kernel_centos4_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0936_kernel_centos4_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880462);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-31 15:15:14 +0100 (Mon, 31 Jan 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2010:0936");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0936_kernel_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0967_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0967_seamonkey_centos4_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0967_seamonkey_centos4_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880463);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-31 15:15:14 +0100 (Mon, 31 Jan 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0967");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0967_seamonkey_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_0013_wireshark_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_0013_wireshark_centos4_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_0013_wireshark_centos4_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880466);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-31 15:15:14 +0100 (Mon, 31 Jan 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2011:0013");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_0013_wireshark_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_0486_xmlsec1_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_0486_xmlsec1_centos5_i386.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_0486_xmlsec1_centos5_i386.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880537);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"5.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:0486");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_0486_xmlsec1_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_MediaWiki_42024.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_MediaWiki_42024.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_MediaWiki_42024.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100732);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-08-02 14:28:14 +0200 (Mon, 02 Aug 2010)");
  script_tag(name:"cvss_base", value:"2.6");
   script_cve_id("CVE-2010-2788");
  script_bugtraq_id(42024);
- script_version ("1.0-$Revision$");
 
  script_name("MediaWiki 'profileinfo.php' Cross Site Scripting Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_MediaWiki_42024.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0061-02_setroubleshoot.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0061-02_setroubleshoot.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0061-02_setroubleshoot.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870012);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.4");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "RHSA", value: "2008:0061-02");
@@ -95,10 +97,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-May/msg00017.html
+  https://www.redhat.com/archives/rhsa-announce/2008-May/msg00017.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of setroubleshoot");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0061-02_setroubleshoot.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0153-01_cups.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0153-01_cups.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0153-01_cups.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870161);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2008:0153-01");
@@ -72,10 +74,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-February/msg00014.html
+  https://www.redhat.com/archives/rhsa-announce/2008-February/msg00014.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of cups");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0153-01_cups.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0192-01_cups.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0192-01_cups.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0192-01_cups.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870174);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2008:0192-01");
@@ -69,10 +71,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-April/msg00000.html
+  https://www.redhat.com/archives/rhsa-announce/2008-April/msg00000.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of cups");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0192-01_cups.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0516-01_evolution.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0516-01_evolution.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0516-01_evolution.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870002);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.6");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2008:0516-01");
@@ -62,10 +64,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-June/msg00002.html
+  https://www.redhat.com/archives/rhsa-announce/2008-June/msg00002.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of evolution");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0516-01_evolution.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0957-02_kernel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0957-02_kernel.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0957-02_kernel.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870061);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2008:0957-02");
@@ -101,10 +103,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-November/msg00001.html
+  https://www.redhat.com/archives/rhsa-announce/2008-November/msg00001.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0957-02_kernel.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_1036-01_firefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_1036-01_firefox.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_1036-01_firefox.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870116);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2008:1036-01");
@@ -81,10 +83,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-December/msg00011.html
+  https://www.redhat.com/archives/rhsa-announce/2008-December/msg00011.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of firefox");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_1036-01_firefox.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0625-01_wireshark.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0625-01_wireshark.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0625-01_wireshark.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870307);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-13 14:24:53 +0200 (Fri, 13 Aug 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0625-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0625-01_wireshark.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0657-02_gdm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0657-02_gdm.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0657-02_gdm.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870313);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-30 16:59:25 +0200 (Mon, 30 Aug 2010)");
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2010:0657-02");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0657-02_gdm.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0967-01_seamonkey.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0967-01_seamonkey.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0967-01_seamonkey.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(870366);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)");
   script_tag(name:"cvss_base", value:"9.3");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0967-01");
   script_cve_id("CVE-2010-3767", "CVE-2010-3772", "CVE-2010-3775", "CVE-2010-3776");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0967-01_seamonkey.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_nov08_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_nov08_win.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_nov08_win.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_flash_player_mult_vuln_nov08_win.nasl 457 2008-11-11 10:53:34Z oct $
+# $Id$
 #
 # Adobe Flash Player Multiple Vulnerabilities - Nov08 (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800054);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-11-12 16:32:06 +0100 (Wed, 12 Nov 2008)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-4818", "CVE-2008-4819", "CVE-2008-4820", "CVE-2008-4821",
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.3
-  Risk factor: High";
+    CVSS Temporal Score : 5.3";
 
   script_description(desc);
   script_summary("Check for the version of Adobe Flash Player");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_nov08_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apache_apr_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apache_apr_detect.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_apache_apr_detect.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_apache_apr_detect.nasl 3847 2009-08-14 15:30:37Z aug $
+# $Id$
 #
 # Apache APR Version Detection
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(800680);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-17 14:35:19 +0200 (Mon, 17 Aug 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Apache APR Version Detection");
   desc = "
 
   Overview : This script detects the installed version of Apache APR
-  and sets the result in KB.
+  and sets the result in KB.";
 
-  Risk factor : None";
-
   script_description(desc);
   script_summary("Set Version of Apache APR in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_apache_apr_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_aphpkb_mult_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_aphpkb_mult_xss_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_aphpkb_mult_xss_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_aphpkb_mult_xss_vuln.nasl 16427 2011-08-01 15:15:15Z aug $
+# $Id$
 #
 # Andy's PHP Knowledgebase Multiple Cross-Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802225);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-02 09:08:31 +0200 (Tue, 02 Aug 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Andy's PHP Knowledgebase Multiple Cross-Site Scripting Vulnerabilities");


Property changes on: trunk/openvas-plugins/scripts/gb_aphpkb_mult_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apple_safari_webkit_mult_vuln_mar10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apple_safari_webkit_mult_vuln_mar10.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_apple_safari_webkit_mult_vuln_mar10.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_apple_safari_webkit_mult_vuln_mar10.nasl 7755 2010-03-18 11:20:26Z mar $
+# $Id$
 #
 # Apple Safari Webkit Multiple Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800493);
-  script_version("$Revision:1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-18 15:44:57 +0100 (Thu, 18 Mar 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0040", "CVE-2010-0041", "CVE-2010-0042", "CVE-2010-0043",
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score      : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score  : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score  : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Apple Safari");


Property changes on: trunk/openvas-plugins/scripts/gb_apple_safari_webkit_mult_vuln_mar10.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_bind_43573.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_bind_43573.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_bind_43573.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_bind_43573.nasl 9124 2010-09-30 11:18:50Z mime $
+# $Id$
 #
 # ISC BIND Denial Of Service and Security Bypass Vulnerability
 #
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100831);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-09-30 13:18:50 +0200 (Thu, 30 Sep 2010)");
  script_bugtraq_id(43573);
  script_cve_id("CVE-2010-0218", "CVE-2010-3762");
  script_tag(name:"cvss_base", value:"5.0");
- script_version("1.0-$Revision$");
 
  script_name("ISC BIND Denial Of Service and Security Bypass Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_bind_43573.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_cacti_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_cacti_sql_inj_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_cacti_sql_inj_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_cacti_sql_inj_vuln.nasl 8798 2010-05-11 17:40:29 may $
+# $Id$
 #
 # Cacti 'export_item_id' Parameter SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800772);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-13 09:36:55 +0200 (Thu, 13 May 2010)");
   script_cve_id("CVE-2010-1431");
   script_bugtraq_id(39653);
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_cacti_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_core_ftp_server_40422.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_core_ftp_server_40422.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_core_ftp_server_40422.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100660);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-31 18:31:53 +0200 (Mon, 31 May 2010)");
  script_bugtraq_id(40422);
- script_version ("1.0-$Revision$");
 
  script_name("Core FTP Server Directory Traversal Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_core_ftp_server_40422.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ecms_43640.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ecms_43640.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ecms_43640.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100839);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-10-04 14:08:22 +0200 (Mon, 04 Oct 2010)");
  script_bugtraq_id(43640);
- script_version ("1.0-$Revision$");
 
  script_name("Evaria ECMS 'Poll.php' Local File Disclosure Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_ecms_43640.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_0001_firefox_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_0001_firefox_fc7.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_0001_firefox_fc7.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861195);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2007-0001");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-May/msg00081.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-May/msg00081.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of firefox");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_0001_firefox_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_018_avahi_fc5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_018_avahi_fc5.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_018_avahi_fc5.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861059);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-018");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00035.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00035.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of avahi");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_018_avahi_fc5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_1383_xpdf_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_1383_xpdf_fc7.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_1383_xpdf_fc7.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861093);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 15:48:41 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-1383");
   script_name( "Fedora Update for xpdf FEDORA-2007-1383");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-August/msg00024.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-August/msg00024.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of xpdf");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_1383_xpdf_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_3191_chmsee_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_3191_chmsee_fc8.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_3191_chmsee_fc8.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861056);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-3191");
   script_name( "Fedora Update for chmsee FEDORA-2007-3191");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00437.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00437.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of chmsee");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_3191_chmsee_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_344_xen_fc5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_344_xen_fc5.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_344_xen_fc5.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861248);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-344");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-March/msg00055.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-March/msg00055.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of xen");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_344_xen_fc5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_3667_cacti_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_3667_cacti_fc8.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_3667_cacti_fc8.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861028);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-3667");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00778.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00778.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of cacti");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_3667_cacti_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_3958_htdig_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_3958_htdig_fc8.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_3958_htdig_fc8.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861197);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-3958");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01025.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01025.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of htdig");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_3958_htdig_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_4385_orage_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_4385_orage_fc7.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_4385_orage_fc7.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861327);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:27:46 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-4385");
   script_name( "Fedora Update for orage FEDORA-2007-4385");
@@ -42,10 +44,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00540.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00540.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of orage");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_4385_orage_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_0984_kernel_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_0984_kernel_fc8.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_0984_kernel_fc8.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860067);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-0984");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00145.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00145.html";
 
-  Risk factor : Medium";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_0984_kernel_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_11511_gnome-python2-extras_fc10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_11511_gnome-python2-extras_fc10.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_11511_gnome-python2-extras_fc10.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860143);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-13 10:35:30 +0100 (Fri, 13 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-11511");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01004.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01004.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of gnome-python2-extras");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_11511_gnome-python2-extras_fc10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_11743_mediawiki_fc10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_11743_mediawiki_fc10.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_11743_mediawiki_fc10.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860324);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-13 10:35:30 +0100 (Fri, 13 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-11743");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01293.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01293.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of mediawiki");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_11743_mediawiki_fc10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_3231_seamonkey_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_3231_seamonkey_fc7.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_3231_seamonkey_fc7.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860355);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 16:43:56 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-3231");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00407.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00407.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_3231_seamonkey_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_4797_samba_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_4797_samba_fc7.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_4797_samba_fc7.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860321);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 16:47:15 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-4797");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of samba");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_4797_samba_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_6440_wireshark_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_6440_wireshark_fc9.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_6440_wireshark_fc9.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860721);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:01:32 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-6440");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00544.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00544.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of wireshark");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_6440_wireshark_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygem-activerecord_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygem-activerecord_fc8.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygem-activerecord_fc8.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860084);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-8282");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00405.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00405.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of rubygem-activerecord");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygem-activerecord_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8322_rubygem-actionmailer_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8322_rubygem-actionmailer_fc9.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8322_rubygem-actionmailer_fc9.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860582);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-8322");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01322.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01322.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of rubygem-actionmailer");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8322_rubygem-actionmailer_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8399_devhelp_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8399_devhelp_fc8.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8399_devhelp_fc8.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860351);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-8399");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01366.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01366.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of devhelp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8399_devhelp_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_9667_evolution-rss_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_9667_evolution-rss_fc8.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_9667_evolution-rss_fc8.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860503);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:07:33 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-9667");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00373.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00373.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of evolution-rss");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_9667_evolution-rss_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_0388_transmission_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_0388_transmission_fc11.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_0388_transmission_fc11.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861634);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-0388");
   script_name("Fedora Update for transmission FEDORA-2010-0388");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034027.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034027.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of transmission");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_0388_transmission_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_11524_kvirc_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_11524_kvirc_fc12.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_11524_kvirc_fc12.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862298);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-02 12:38:17 +0200 (Mon, 02 Aug 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-11524");
   script_name("Fedora Update for kvirc FEDORA-2010-11524");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_11524_kvirc_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_12911_DeviceKit-power_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_12911_DeviceKit-power_fc12.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_12911_DeviceKit-power_fc12.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862339);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-24 07:04:19 +0200 (Tue, 24 Aug 2010)");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-12911");
   script_tag(name:"cvss_base", value:"3.6");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_12911_DeviceKit-power_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14268_fuse-encfs_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14268_fuse-encfs_fc13.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14268_fuse-encfs_fc13.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862418);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-22 08:32:53 +0200 (Wed, 22 Sep 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14268");
   script_name("Fedora Update for fuse-encfs FEDORA-2010-14268");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14268_fuse-encfs_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14996_sudo_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14996_sudo_fc12.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14996_sudo_fc12.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862436);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-01 16:10:21 +0200 (Fri, 01 Oct 2010)");
   script_tag(name:"cvss_base", value:"6.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14996");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14996_sudo_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_4321_cpio_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_4321_cpio_fc12.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_4321_cpio_fc12.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861781);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-22 11:34:53 +0100 (Mon, 22 Mar 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-4321");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of cpio");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_4321_cpio_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_8558_quake3_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_8558_quake3_fc12.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_8558_quake3_fc12.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861954);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-17 16:00:10 +0200 (Mon, 17 May 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-8558");
   script_name("Fedora Update for quake3 FEDORA-2010-8558");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_8558_quake3_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_9479_dhcp_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_9479_dhcp_fc12.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_9479_dhcp_fc12.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862203);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-25 12:25:26 +0200 (Fri, 25 Jun 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-9479");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_9479_dhcp_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_11019_kernel_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11019_kernel_fc15.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11019_kernel_fc15.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863431);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-11019");
   script_cve_id("CVE-2011-2905");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_11019_kernel_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_13181_bcfg2_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_13181_bcfg2_fc14.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_13181_bcfg2_fc14.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863574);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-10 16:05:48 +0200 (Mon, 10 Oct 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2011-13181");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_13181_bcfg2_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_13465_gnome-python2-extras_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_13465_gnome-python2-extras_fc15.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_13465_gnome-python2-extras_fc15.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863557);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-30 16:02:57 +0200 (Fri, 30 Sep 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-13465");
   script_name("Fedora Update for gnome-python2-extras FEDORA-2011-13465");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_13465_gnome-python2-extras_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_13467_gnome-python2-extras_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_13467_gnome-python2-extras_fc14.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_13467_gnome-python2-extras_fc14.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863563);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-04 16:55:13 +0200 (Tue, 04 Oct 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-13467");
   script_name("Fedora Update for gnome-python2-extras FEDORA-2011-13467");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_13467_gnome-python2-extras_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_4244_nss_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_4244_nss_fc14.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_4244_nss_fc14.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862988);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-19 07:58:39 +0200 (Tue, 19 Apr 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-4244");
   script_name("Fedora Update for nss FEDORA-2011-4244");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_4244_nss_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdeartwork_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdeartwork_fc14.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdeartwork_fc14.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863036);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-5200");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdeartwork_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7756_mutt_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7756_mutt_fc13.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7756_mutt_fc13.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863288);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-20 08:37:08 +0200 (Mon, 20 Jun 2011)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-7756");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_7756_mutt_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8667_gdk-pixbuf2_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8667_gdk-pixbuf2_fc14.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8667_gdk-pixbuf2_fc14.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863433);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-8667");
   script_cve_id("CVE-2011-2485");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8667_gdk-pixbuf2_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_firefox_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_firefox_info_disc_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_firefox_info_disc_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_firefox_info_disc_vuln.nasl 14828 2011-04-20 12:12:12Z apr $
+# $Id$
 #
 # Mozilla Firefox Information Disclosure Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801875);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-22 16:38:12 +0200 (Fri, 22 Apr 2011)");
   script_cve_id("CVE-2011-1712");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/gb_firefox_info_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_firefox_unspecified_vuln_oct10_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_firefox_unspecified_vuln_oct10_win.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_firefox_unspecified_vuln_oct10_win.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_firefox_unspecified_vuln_oct10_win.nasl 11915 2010-10-29 11:50:17Z oct $
+# $Id$
 #
 # Mozilla Firefox Unspecified Vulnerability Oct-10 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801475);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-02 18:01:36 +0100 (Tue, 02 Nov 2010)");
   script_cve_id("CVE-2010-3765");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");


Property changes on: trunk/openvas-plugins/scripts/gb_firefox_unspecified_vuln_oct10_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_freefloat_ftp_rest_cmd_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_freefloat_ftp_rest_cmd_bof_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_freefloat_ftp_rest_cmd_bof_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_freefloat_ftp_rest_cmd_bof_vuln.nasl 16163 2011-07-19 12:00:15Z jul $
+# $Id$
 #
 # Freefloat FTP Server POST Auth 'REST' Command Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802029);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-19 14:57:20 +0200 (Tue, 19 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("Freefloat FTP Server POST Auth 'REST' Command Buffer Overflow Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/gb_freefloat_ftp_rest_cmd_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ftpshell_server_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ftpshell_server_bof_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ftpshell_server_bof_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ftpshell_server_bof_vuln.nasl 926 2009-02-05 13:20:29Z feb $
+# $Id$
 #
 # FTPShell Server Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800226);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-06 13:48:17 +0100 (Fri, 06 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0349");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 8.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.4";
 
   script_description(desc);
   script_summary("Check for the version of FTPShell Server");


Property changes on: trunk/openvas-plugins/scripts/gb_ftpshell_server_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_gb_hp_openview_nnm_41829.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_gb_hp_openview_nnm_41829.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_gb_hp_openview_nnm_41829.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100786);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-09-07 15:26:31 +0200 (Tue, 07 Sep 2010)");
  script_bugtraq_id(41829);
  script_tag(name:"cvss_base", value:"10.0");
   script_cve_id("CVE-2010-2703");
- script_version ("1.0-$Revision$");
 
  script_name("HP OpenView Network Node Manager 'execvp_nc()' Code Execution Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_gb_hp_openview_nnm_41829.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl 15980 2011-07-05 17:52:29Z jul $
+# $Id$
 #
 # Google Chrome WebGL Texture Information Disclosure Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802303);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-07 15:43:33 +0200 (Thu, 07 Jul 2011)");
   script_cve_id("CVE-2011-2599");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/gb_google_chrome_webgl_texture_info_disc_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835134);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00169");
   script_name( "HP-UX Update for rpcbind Software HPSBUX00169");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00979921-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00979921-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of rpcbind Software");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00169.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835159);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00228");
   script_name( "HP-UX Update for X Font Server (xfs) Software HPSBUX00228");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00965492-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00965492-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of X Font Server (xfs) Software");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00228.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02458.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02458.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02458.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835212);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-21 10:22:05 +0200 (Mon, 21 Sep 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "02458");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01866324-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01866324-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bootpd");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02458.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02623.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02623.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02623.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835248);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "HPSBUX", value: "02623");


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02623.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_icq_remote_code_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_icq_remote_code_exec_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_icq_remote_code_exec_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_icq_remote_code_exec_vuln.nasl 13212 2011-01-19 13:12:24Z jan $
+# $Id$
 #
 # ICQ 7 Instant Messaging Client Remote Code Execution Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801574);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-21 14:38:54 +0100 (Fri, 21 Jan 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2011-0487");


Property changes on: trunk/openvas-plugins/scripts/gb_icq_remote_code_exec_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_iwork_detect_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_iwork_detect_macosx.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_iwork_detect_macosx.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_iwork_detect_macosx.nasl 16497 2011-08-30 11:20:50Z aug $
+# $Id$
 #
 # iWork Version Detection (Mac OS X)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802145);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-07 08:36:57 +0200 (Wed, 07 Sep 2011)");
   script_tag(name:"risk_factor", value:"None");
   script_name("iWork Version Detection (Mac OS X)");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_iwork_detect_macosx.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_kaspersky_av_2010_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_kaspersky_av_2010_dos_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_kaspersky_av_2010_dos_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_kaspersky_av_2010_dos_vuln.nasl 5989 2009-12-05 12:03:46Z dec $
+# $Id$
 #
 # Kaspersky Anti-Virus 2010 'kl1.sys' Driver DoS Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800154);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-05 12:49:16 +0100 (Sat, 05 Dec 2009)");
   script_tag(name:"cvss_base", value:"4.9");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-4114");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score      : 4.9 (AV:L/AC:L/Au:NR/C:N/I:N/A:C)
-    CVSS Temporal Score  : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score  : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of Kaspersky Anti-Virus");


Property changes on: trunk/openvas-plugins/scripts/gb_kaspersky_av_2010_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_kerio_mailserver_xss_vuln_aug09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_kerio_mailserver_xss_vuln_aug09.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_kerio_mailserver_xss_vuln_aug09.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_kerio_mailserver_xss_vuln_aug09.nasl 2009-08-07 11:54:58Z aug $
+# $Id$
 #
 # Kerio MailServer WebMail 'Integration' Page XSS Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800675);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-11 07:36:16 +0200 (Tue, 11 Aug 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-2636");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:P/A:N)
-    CVSS Temporal Score : 3.2
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.2";
 
   script_description(desc);
   script_summary("Check for the version of Kerio MailServer");


Property changes on: trunk/openvas-plugins/scripts/gb_kerio_mailserver_xss_vuln_aug09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_lunascape_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_lunascape_detect.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_lunascape_detect.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_lunascape_detect.nasl 4377 2009-09-04 15:13:29Z sep $
+# $Id$
 #
 # Lunascape Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(800893);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-08 18:25:53 +0200 (Tue, 08 Sep 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Lunascape Version Detection");
   desc = "
   Overview: This script detects the installed version of Lunascape Browser
-  and sets the result in KB.
+  and sets the result in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of Lunascape Browser");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_lunascape_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_029_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_029_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_029_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830070);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:029-1");
   script_name( "Mandriva Update for squidGuard MDKA-2007:029-1 (squidGuard)");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-05/msg00000.php
+  http://lists.mandriva.com/security-announce/2007-05/msg00000.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of squidGuard");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_029_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_071.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_071.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_071.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830053);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:071");
   script_name( "Mandriva Update for libusb MDKA-2007:071 (libusb)");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-06/msg00048.php
+  http://lists.mandriva.com/security-announce/2007-06/msg00048.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libusb");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_071.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_190.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_190.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_190.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830104);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKSA", value: "2007:190");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-09/msg00021.php
+  http://lists.mandriva.com/security-announce/2007-09/msg00021.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kdebase");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_190.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_204_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_204_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_204_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830236);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:00:25 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDKSA", value: "2007:204-1");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-11/msg00020.php
+  http://lists.mandriva.com/security-announce/2007-11/msg00020.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of cups");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_204_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_221.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_221.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_221.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830021);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:00:25 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDKSA", value: "2007:221");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-11/msg00029.php
+  http://lists.mandriva.com/security-announce/2007-11/msg00029.php";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of kdegraphics");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_221.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_243.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_243.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_243.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830032);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:00:25 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"7.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKSA", value: "2007:243");
@@ -64,10 +66,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-12/msg00011.php
+  http://lists.mandriva.com/security-announce/2007-12/msg00011.php";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of MySQL");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_243.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_245.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_245.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_245.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830212);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:00:25 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"7.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKSA", value: "2007:245");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-12/msg00014.php
+  http://lists.mandriva.com/security-announce/2007-12/msg00014.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of wpa_supplicant");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_245.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_049.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_049.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_049.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830751);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:049");
   script_name( "Mandriva Update for drakxtools MDVA-2008:049 (drakxtools)");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-04/msg00023.php
+  http://lists.mandriva.com/security-announce/2008-04/msg00023.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of drakxtools");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_049.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_070.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_070.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_070.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830689);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:070");
   script_name( "Mandriva Update for dkms MDVA-2008:070 (dkms)");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-05/msg00029.php
+  http://lists.mandriva.com/security-announce/2008-05/msg00029.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of dkms");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_070.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_074.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_074.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_074.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830373);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:074");
   script_name( "Mandriva Update for drakxtools MDVA-2008:074 (drakxtools)");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-05/msg00034.php
+  http://lists.mandriva.com/security-announce/2008-05/msg00034.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of drakxtools");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_074.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_178.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_178.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_178.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831101);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-06 10:05:18 +0200 (Tue, 06 Jul 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:178");
   script_name("Mandriva Update for mdkonline MDVA-2010:178 (mdkonline)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_178.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_002.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_002.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_002.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831313);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2011:002");
   script_name("Mandriva Update for cyrus-sasl MDVA-2011:002 (cyrus-sasl)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_002.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_229.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_229.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_229.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830447);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2008:229");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-11/msg00011.php
+  http://lists.mandriva.com/security-announce/2008-11/msg00011.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of clamav");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_229.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_240.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_240.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_240.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830547);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2008:240");
   script_name( "Mandriva Update for vinagre MDVSA-2008:240 (vinagre)");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-12/msg00016.php
+  http://lists.mandriva.com/security-announce/2008-12/msg00016.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of vinagre");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_240.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_008.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_008.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_008.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830823);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-19 08:58:46 +0100 (Tue, 19 Jan 2010)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:008");
@@ -66,10 +68,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-01/msg00046.php
+  http://lists.mandriva.com/security-announce/2010-01/msg00046.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of php");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_008.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_042.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_042.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_042.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830899);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-22 13:38:33 +0100 (Mon, 22 Feb 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2010:042");
@@ -93,10 +95,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-02/msg00043.php
+  http://lists.mandriva.com/security-announce/2010-02/msg00043.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of firefox");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_042.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_054.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_054.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_054.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830930);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2010:054");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-03/msg00011.php
+  http://lists.mandriva.com/security-announce/2010-03/msg00011.php";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of pam_krb5");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_054.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_156.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_156.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_156.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831135);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-24 07:04:19 +0200 (Tue, 24 Aug 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:156");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_156.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_023.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_023.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_023.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831323);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-11 13:26:17 +0100 (Fri, 11 Feb 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2011:023");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_023.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_065.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_065.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_065.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831363);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-11 15:05:25 +0200 (Mon, 11 Apr 2011)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2011:065");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_065.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_115.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_115.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_115.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831426);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-22 14:44:51 +0200 (Fri, 22 Jul 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2011:115");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_115.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms10-009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms10-009.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ms10-009.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms10-009.nasl 12262 2010-11-22 13:20:09Z nov $
+# $Id$
 #
 # Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801479);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-25 08:29:59 +0100 (Thu, 25 Nov 2010)");
   script_cve_id("CVE-2010-0239", "CVE-2010-0240", "CVE-2010-0241",
                 "CVE-2010-0242");
   script_bugtraq_id(38061, 38062, 38063, 38064);


Property changes on: trunk/openvas-plugins/scripts/gb_ms10-009.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_my_news_49818.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_my_news_49818.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_my_news_49818.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103281);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-09-29 13:17:07 +0200 (Thu, 29 Sep 2011)");
  script_bugtraq_id(49818);
- script_version ("1.0-$Revision$");
 
  script_name("MyNews 1.2 'basepath' Parameter Multiple Remote File Include Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_my_news_49818.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_nginx_http_request_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_nginx_http_request_bof_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_nginx_http_request_bof_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_nginx_http_request_bof_vuln.nasl 4796 2010-11-16 15:15:15Z nov $
+# $Id$
 #
 # nginx HTTP Request Remote Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801636);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-18 06:30:08 +0100 (Thu, 18 Nov 2010)");
   script_cve_id("CVE-2009-2629");
   script_bugtraq_id(36384);
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_nginx_http_request_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_novell_imanager_43635.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_novell_imanager_43635.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_novell_imanager_43635.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100835);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-10-04 14:08:22 +0200 (Mon, 04 Oct 2010)");
  script_bugtraq_id(43635);
- script_version ("1.0-$Revision$");
 
  script_name("Novell iManager 'getMultiPartParameters()' Arbitrary File Upload Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_novell_imanager_43635.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_novell_zhm_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_novell_zhm_detect.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_novell_zhm_detect.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_novell_zhm_detect.nasl 12300 2010-11-25 16:16:16Z nov $
+# $Id$
 #
 # Novell ZENworks Handheld Management Version Detection
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801644);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-30 12:42:12 +0100 (Tue, 30 Nov 2010)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Novell ZENworks Handheld Management Version Detection");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_novell_zhm_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct08_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct08_lin.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct08_lin.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_opera_mult_vuln_oct08_lin.nasl 386 2008-10-29 18:35:35Z oct $
+# $Id$
 #
 # Opera Web Browser Multiple XSS Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800045);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-30 06:53:04 +0100 (Thu, 30 Oct 2008)");
   script_tag(name:"cvss_base", value:"8.8");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-4696", "CVE-2008-4697",
@@ -65,8 +67,7 @@
 
   CVSS Score:
     CVSS Base Score     : 8.8 (AV:N/AC:M/Au:NR/C:C/I:C/A:N)
-    CVSS Temporal Score : 6.5
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.5";
 
   script_description(desc);
   script_summary("Check for the version of Opera Web Browser");


Property changes on: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_oct08_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_opera_xss_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_opera_xss_vuln_lin.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_opera_xss_vuln_lin.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_opera_xss_vuln_lin.nasl 3326 2009-07-08 10:13:23Z jul $
+# $Id$
 #
 # Opera Web Browser 'Refresh' Header XSS Vulnerabilities (Linux)
 #
@@ -28,6 +28,8 @@
 {
   script_id(800652);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-07-09 10:58:23 +0200 (Thu, 09 Jul 2009)");
   script_tag(name:"cvss_base", value:"8.8");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-2351");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 8.8 (AV:N/AC:M/Au:NR/C:C/I:C/A:N)
-    CVSS Temporal Score : 7.5
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.5";
 
   script_description(desc);
   script_summary("Check for the version of Opera Web Browser");


Property changes on: trunk/openvas-plugins/scripts/gb_opera_xss_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_mult_vuln_dec09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_mult_vuln_dec09.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_php_mult_vuln_dec09.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_php_mult_vuln_dec09.nasl 5956 2009-12-02 18:42:56Z dec $
+# $Id$
 #
 # PHP Multiple Vulnerabilities Dec-09
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801060);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-04 14:17:59 +0100 (Fri, 04 Dec 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-4018","CVE-2009-2626");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.9
-  Risk factor : High";
+    CVSS Temporal Score : 5.9";
 
   script_description(desc);
   script_summary("Check for the version of PHP");


Property changes on: trunk/openvas-plugins/scripts/gb_php_mult_vuln_dec09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_phptroubleticket_38486.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phptroubleticket_38486.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_phptroubleticket_38486.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100515);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-03-04 12:28:05 +0100 (Thu, 04 Mar 2010)");
  script_bugtraq_id(38486);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Phptroubleticket 'vedi_faq.php' SQL Injection Vulnerability");
@@ -47,10 +49,8 @@
 
 References:
 http://www.securityfocus.com/bid/38486
-http://www.phptroubleticket.org/downloads.html
+http://www.phptroubleticket.org/downloads.html";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if Phptroubleticket is prone to an SQL-injection vulnerability");
  script_category(ACT_ATTACK);


Property changes on: trunk/openvas-plugins/scripts/gb_phptroubleticket_38486.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_samba_40097.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_samba_40097.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_samba_40097.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100644);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-19 12:58:40 +0200 (Wed, 19 May 2010)");
  script_tag(name:"cvss_base", value:"5.0");
   script_cve_id("CVE-2010-1635");
  script_bugtraq_id(40097);
- script_version ("1.0-$Revision$");
 
  script_name("Samba Multiple Remote Denial of Service Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_samba_40097.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_110671_04.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_110671_04.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_110671_04.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855549);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "110671-04");
   script_name( "Solaris Update for /usr/sbin/static/rcp 110671-04");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110671-04-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110671-04-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of /usr/sbin/static/rcp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_110671_04.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_112390_14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_112390_14.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_112390_14.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855314);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "112390-14");
   script_name( "Solaris Update for Supplemental Encryption Kerberos V5 112390-14");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-112390-14-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-112390-14-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Supplemental Encryption Kerberos V5");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_112390_14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_114362_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_114362_01.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_114362_01.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855416);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:24:08 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "114362-01");
   script_name( "Solaris Update for lofi 114362-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114362-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114362-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of lofi");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_114362_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_119450_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_119450_01.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_119450_01.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855331);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "119450-01");
   script_name( "Solaris Update for Perl 119450-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119450-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119450-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Perl");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_119450_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_121096_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_121096_02.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_121096_02.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855574);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:31:50 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "121096-02");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-121096-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-121096-02-1";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of GNOME EXIF tag parsing library for digital cameras");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_121096_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_121104_10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_121104_10.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_121104_10.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855744);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-13 15:16:45 +0200 (Tue, 13 Oct 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "121104-10");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-121104-10-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-121104-10-1";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of Adobe Acrobat Reader");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_121104_10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_122912_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_122912_17.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_122912_17.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855731);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-13 15:16:45 +0200 (Tue, 13 Oct 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "122912-17");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122912-17-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122912-17-1";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of Apache 1.3");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_122912_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_126365_15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_126365_15.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_126365_15.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855712);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-13 15:16:45 +0200 (Tue, 13 Oct 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "126365-15");
   script_name("Solaris Update for CDE Desktop changes - Solaris Trusted Extensions 126365-15");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-126365-15-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-126365-15-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of CDE Desktop changes - Solaris Trusted Extensions");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_126365_15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_126929_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_126929_02.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_126929_02.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855503);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:31:50 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "126929-02");
   script_name( "Solaris Update for rpcsec_gss 126929-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-126929-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-126929-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of rpcsec_gss");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_126929_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_138322_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_138322_03.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_solaris_138322_03.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855623);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-23 10:48:35 +0200 (Wed, 23 Sep 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "138322-03");
   script_name("Solaris Update for Perl 138322-03");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138322-03-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138322-03-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Perl");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_138322_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_surge_ftp_server_admin_mult_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_surge_ftp_server_admin_mult_xss_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_surge_ftp_server_admin_mult_xss_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_surge_ftp_server_admin_mult_xss_vuln.nasl 16759 2011-08-18 17:12:58Z aug $
+# $Id$
 #
 # Surge-FTP Admin Multiple Reflected Cross-site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801970);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-18 14:57:45 +0200 (Thu, 18 Aug 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Surge-FTP Admin Multiple Reflected Cross-site Scripting Vulnerabilities");


Property changes on: trunk/openvas-plugins/scripts/gb_surge_ftp_server_admin_mult_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_suse_2008_025.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_suse_2008_025.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_suse_2008_025.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(850026);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-23 16:44:26 +0100 (Fri, 23 Jan 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUSE-SA", value: "2008-025");
@@ -91,10 +93,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www.novell.com/linux/security/advisories/2008_25_ibmjava.html
+  http://www.novell.com/linux/security/advisories/2008_25_ibmjava.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of IBMJava2,IBMJava5,java-1_4_2-ibm,java-1_5_0-ibm");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_suse_2008_025.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_symantec_altiris_ns_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_symantec_altiris_ns_detect.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_symantec_altiris_ns_detect.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_symantec_altiris_ns_detect.nasl 7083 2010-02-11 19:06:24Z feb $
+# $Id$
 #
 # Symantec Altiris Notification Server Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(800984);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-11 16:37:59 +0100 (Thu, 11 Feb 2010)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Symantec Altiris Notification Server Version Detection");
   desc = "
   Overview: This script detects the installed version of Symantec Altiris
-  Notification Server and sets the result in KB.
+  Notification Server and sets the result in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Sets Symantec Altiris Notification Server Version in the KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_symantec_altiris_ns_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1113_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1113_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1113_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840648);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-10 14:04:15 +0200 (Tue, 10 May 2011)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1113-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1113_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1138_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1138_2.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1138_2.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840665);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-03 09:20:26 +0200 (Fri, 03 Jun 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1138-2");
   script_name("Ubuntu Update for modemmanager USN-1138-2");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1138_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1164_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1164_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1164_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840693);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-08 16:31:28 +0200 (Fri, 08 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1164-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1164_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1225_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1225_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1225_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840764);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-10 16:05:48 +0200 (Mon, 10 Oct 2011)");
   script_tag(name:"cvss_base", value:"8.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "1225-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1225_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1232_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1232_2.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1232_2.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840774);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-21 16:31:29 +0200 (Fri, 21 Oct 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1232-2");
   script_cve_id("CVE-2010-4818", "CVE-2010-4819", "CVE-2011-4028", "CVE-2011-4029");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1232_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1249_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1249_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1249_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840795);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-31 13:45:00 +0100 (Mon, 31 Oct 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1249-1");
   script_cve_id("CVE-2011-3361");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1249_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_404_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_404_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_404_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840166);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "404-1");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-January/000463.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-January/000463.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of linux-restricted-modules-2.6.17 vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_404_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_418_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_418_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_418_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840089);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "418-1");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-February/000478.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-February/000478.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bind9 vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_418_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_2.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_2.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840114);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "428-2");
@@ -85,10 +87,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-March/000493.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-March/000493.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of firefox regression");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_457_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_457_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_457_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840102);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.4");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "457-1");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-May/000526.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-May/000526.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of elinks vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_457_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840047);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "511-1");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-September/000587.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-September/000587.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of krb5, librpcsecgss vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_561_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_561_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_561_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840204);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "561-1");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-January/000647.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-January/000647.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of pwlib vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_561_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_644_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_644_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_644_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840208);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "644-1");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-September/000749.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-September/000749.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of libxml2 vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_644_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vlc_media_player_mp4_bof_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vlc_media_player_mp4_bof_vuln_lin.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_vlc_media_player_mp4_bof_vuln_lin.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vlc_media_player_mp4_bof_vuln_lin.nasl 15121 2011-05-29 15:23:17 may $
+# $Id$
 #
 # VLC Media Player 'MP4_ReadBox_skcr()' Buffer Overflow Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801783);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-16 15:25:30 +0200 (Mon, 16 May 2011)");
   script_cve_id("CVE-2011-1684");
   script_bugtraq_id(47293);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/gb_vlc_media_player_mp4_bof_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vmware_prdts_mult_vuln_win01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vmware_prdts_mult_vuln_win01.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_vmware_prdts_mult_vuln_win01.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vmware_prdts_mult_vuln_win01.nasl 8352 2010-04-13 13:20:21Z apr $
+# $Id$
 #
 # VMware Products Multiple Vulnerabilities (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801319);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-16 16:17:26 +0200 (Fri, 16 Apr 2010)");
   script_cve_id("CVE-2010-1139", "CVE-2009-1564", "CVE-2009-1565");
   script_bugtraq_id(39345, 39363, 39364);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/gb_vmware_prdts_mult_vuln_win01.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_wordpress_php_speedy_plugin_title_param_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wordpress_php_speedy_plugin_title_param_xss.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_wordpress_php_speedy_plugin_title_param_xss.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_wordpress_php_speedy_plugin_title_param_xss.nasl 14314 2011-03-14 18:16:16Z mar $
+# $Id$
 #
 # WordPress PHP Speedy Plugin 'title' Parameter Cross Site Scripting Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802009);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-16 15:16:52 +0100 (Wed, 16 Mar 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("WordPress PHP Speedy Plugin 'title' Parameter Cross Site Scripting Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/gb_wordpress_php_speedy_plugin_title_param_xss.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_yahoo_msg_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_yahoo_msg_detect.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/gb_yahoo_msg_detect.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_yahoo_msg_detect.nasl 6032 2009-12-05 13:01:29Z dec $
+# $Id$
 #
 # Yahoo! Messenger Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(801149);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-08 05:49:24 +0100 (Tue, 08 Dec 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Yahoo! Messenger Version Detection");
   desc = "
   Overview: This script detects the installed version of Yahoo! Messenger
-  and sets the result in KB.
+  and sets the result in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of Yahoo! Messenger");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_yahoo_msg_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200405_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200405_07.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200405_07.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54567);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2004-0400");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200405-07 (Exim)";
@@ -49,10 +51,8 @@
     # emerge '>=net-mail/exim-4.33-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200405-07
-http://bugs.gentoo.org/show_bug.cgi?id=50217
+http://bugs.gentoo.org/show_bug.cgi?id=50217";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200405-07 (Exim)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200405_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200406_22.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200406_22.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200406_22.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54607);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200406-22 (Pavuk)";
  script_name(name);
@@ -46,10 +48,8 @@
     # emerge -pv '>=net-misc/pavuk-0.9.28-r2'
     # emerge '>='net-misc/pavuk-0.9.28-r2
 
-http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200406-22
+http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200406-22";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200406-22 (Pavuk)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200406_22.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200408_24.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200408_24.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200408_24.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54654);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2004-0415", "CVE-2004-0685");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200408-24 (Kernel)";
@@ -55,10 +57,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200408-24
 http://bugs.gentoo.org/show_bug.cgi?id=59378
 http://bugs.gentoo.org/show_bug.cgi?id=59905
-http://bugs.gentoo.org/show_bug.cgi?id=59769
+http://bugs.gentoo.org/show_bug.cgi?id=59769";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200408-24 (Kernel)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200408_24.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200410_16.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200410_16.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200410_16.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54707);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200410-16 (PostgreSQL)";
  script_name(name);
@@ -52,10 +54,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200410-16
 http://bugs.gentoo.org/show_bug.cgi?id=66371
-http://www.trustix.org/errata/2004/0050/
+http://www.trustix.org/errata/2004/0050/";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200410-16 (PostgreSQL)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200410_16.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200603_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200603_17.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200603_17.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(56545);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-1148", "CVE-2006-1148");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200603-17 (peercast)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-sound/peercast-0.1217'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200603-17
-http://bugs.gentoo.org/show_bug.cgi?id=123432
+http://bugs.gentoo.org/show_bug.cgi?id=123432";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200603-17 (peercast)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200603_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200611_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200611_01.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200611_01.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57914);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-4573");
- script_version ("$");
  script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200611-01 (screen)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose '>=app-misc/screen-4.0.3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200611-01
-http://bugs.gentoo.org/show_bug.cgi?id=152770
+http://bugs.gentoo.org/show_bug.cgi?id=152770";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200611-01 (screen)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200611_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200701_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200701_02.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200701_02.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57962);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-6497", "CVE-2006-6498", "CVE-2006-6499", "CVE-2006-6500", "CVE-2006-6501", "CVE-2006-6502", "CVE-2006-6503", "CVE-2006-6504", "CVE-2006-6506", "CVE-2006-6507");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200701-02 (mozilla-firefox)";
@@ -55,10 +57,8 @@
 '>=www-client/mozilla-firefox-bin-1.5.0.9'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200701-02
-http://bugs.gentoo.org/show_bug.cgi?id=156023
+http://bugs.gentoo.org/show_bug.cgi?id=156023";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200701-02 (mozilla-firefox)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200701_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200701_09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200701_09.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200701_09.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57969);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-6767");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.4");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200701-09 (oftpd)";
@@ -46,10 +48,8 @@
     # emerge --ask --oneshot --verbose '>=net-ftp/oftpd-0.3.7-r3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200701-09
-http://bugs.gentoo.org/show_bug.cgi?id=159178
+http://bugs.gentoo.org/show_bug.cgi?id=159178";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200701-09 (oftpd)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200701_09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200701_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200701_17.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200701_17.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57977);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-0235");
- script_version ("$");
  script_tag(name:"cvss_base", value:"3.7");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200701-17 (libgtop)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=gnome-base/libgtop-2.14.6'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200701-17
-http://bugs.gentoo.org/show_bug.cgi?id=162169
+http://bugs.gentoo.org/show_bug.cgi?id=162169";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200701-17 (libgtop)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200701_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200702_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200702_01.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200702_01.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58018);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-0452", "CVE-2007-0454");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200702-01 (samba)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=net-fs/samba-3.0.24'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200702-01
-http://bugs.gentoo.org/show_bug.cgi?id=165549
+http://bugs.gentoo.org/show_bug.cgi?id=165549";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200702-01 (samba)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200702_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200703_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200703_07.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200703_07.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58124);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-0803");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200703-07 (STLport)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=dev-libs/STLport-5.0.3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200703-07
-http://bugs.gentoo.org/show_bug.cgi?id=165837
+http://bugs.gentoo.org/show_bug.cgi?id=165837";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200703-07 (STLport)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200703_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200705_25.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200705_25.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200705_25.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58303);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-2799");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200705-25 (file)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose '>=sys-apps/file-4.21'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200705-25
-http://bugs.gentoo.org/show_bug.cgi?id=179583
+http://bugs.gentoo.org/show_bug.cgi?id=179583";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200705-25 (file)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200705_25.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200711_27.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200711_27.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200711_27.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(59247);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-5395");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200711-27 (link-grammar)";
@@ -46,10 +48,8 @@
     # emerge --ask --oneshot --verbose '>=dev-libs/link-grammar-4.2.4-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200711-27
-http://bugs.gentoo.org/show_bug.cgi?id=196803
+http://bugs.gentoo.org/show_bug.cgi?id=196803";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200711-27 (link-grammar)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200711_27.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200712_25.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200712_25.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200712_25.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60087);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-4575");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200712-25 (openoffice openoffice-bin hsqldb)";
@@ -58,10 +60,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200712-25
 http://bugs.gentoo.org/show_bug.cgi?id=200771
-http://bugs.gentoo.org/show_bug.cgi?id=201799
+http://bugs.gentoo.org/show_bug.cgi?id=201799";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200712-25 (openoffice openoffice-bin hsqldb)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200712_25.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200804_28.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200804_28.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200804_28.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(60872);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200804-28 (jrockit-jdk-bin)";
  script_name(name);
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200804-28
 http://bugs.gentoo.org/show_bug.cgi?id=218226
-http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
+http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200804-28 (jrockit-jdk-bin)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200804_28.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200809_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200809_06.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200809_06.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(61601);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-3732", "CVE-2008-3794");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200809-06 (vlc)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200809-06
 http://bugs.gentoo.org/show_bug.cgi?id=235238
-http://bugs.gentoo.org/show_bug.cgi?id=235589
+http://bugs.gentoo.org/show_bug.cgi?id=235589";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200809-06 (vlc)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200809_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200903_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200903_07.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200903_07.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(63538);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-13 19:24:56 +0100 (Fri, 13 Mar 2009)");
  script_cve_id("CVE-2008-4314");
- script_version ("$");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200903-07 (samba)";
@@ -50,10 +52,8 @@
     # emerge --ask --oneshot --verbose '>=net-fs/samba-3.0.33'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200903-07
-http://bugs.gentoo.org/show_bug.cgi?id=247620
+http://bugs.gentoo.org/show_bug.cgi?id=247620";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200903-07 (samba)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200903_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200911_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200911_03.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_200911_03.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(66333);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-03 22:10:42 +0100 (Thu, 03 Dec 2009)");
  script_cve_id("CVE-2008-5005", "CVE-2008-5006", "CVE-2008-5514");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Gentoo Security Advisory GLSA 200911-03 (c-client uw-imap)");
@@ -57,10 +59,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200911-03
 http://bugs.gentoo.org/show_bug.cgi?id=245425
-http://bugs.gentoo.org/show_bug.cgi?id=252567
+http://bugs.gentoo.org/show_bug.cgi?id=252567";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 200911-03 (c-client uw-imap)");


Property changes on: trunk/openvas-plugins/scripts/glsa_200911_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201006_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201006_03.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_201006_03.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,10 +30,12 @@
 if(description)
 {
  script_id(69006);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"9.3");
  script_cve_id("CVE-2009-1882");
  script_tag(name:"risk_factor", value:"Critical");
- script_version ("$Revision$");
  script_name("Gentoo Security Advisory GLSA 201006-03 (imagemagick)");
 
  desc = "The remote host is missing updates announced in
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose '>=media-gfx/imagemagick-6.5.2.9'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201006-03
-http://bugs.gentoo.org/show_bug.cgi?id=271502
+http://bugs.gentoo.org/show_bug.cgi?id=271502";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201006-03 (imagemagick)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201006_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201101_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201101_01.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/glsa_201101_01.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,10 +30,12 @@
 if(description)
 {
  script_id(69037);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2009-5018");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
  script_name("Gentoo Security Advisory GLSA 201101-01 (gif2png)");
 
  desc = "The remote host is missing updates announced in
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose '>=media-gfx/gif2png-2.5.1-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201101-01
-http://bugs.gentoo.org/show_bug.cgi?id=346501
+http://bugs.gentoo.org/show_bug.cgi?id=346501";
 
-Risk factor: High";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201101-01 (gif2png)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201101_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/groupwise_web_interface_htmlver_hole.nasl
===================================================================
--- trunk/openvas-plugins/scripts/groupwise_web_interface_htmlver_hole.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/groupwise_web_interface_htmlver_hole.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(10873);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2002-0341");
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "GroupWise Web Interface 'HTMLVER' hole";
@@ -38,8 +40,7 @@
 the remote computer and even read local files from its
 hard drive
 
-Solution : contact your vendor for a patch
-Risk factor: Medium";
+Solution : contact your vendor for a patch";
 
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/http_trace.nasl
===================================================================
--- trunk/openvas-plugins/scripts/http_trace.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/http_trace.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,20 +29,20 @@
 if(description)
 {
  script_id(11040);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"None");
  
  name = "HTTP TRACE";
  script_name(name);
  
  desc = "
-Transparent or reverse HTTP proxies may be implement on some sites.
+Transparent or reverse HTTP proxies may be implement on some sites.";
 
-Risk factor : None";
 
 
 
-
  script_description(desc);
  
  summary = "Look for an HTTP proxy on the way";

Modified: trunk/openvas-plugins/scripts/icecast_slash_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/icecast_slash_dos.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/icecast_slash_dos.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,10 +28,12 @@
 if(description)
 {
  script_id(15400);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(2933);
  script_cve_id("CVE-2001-1083");
  script_xref(name:"OSVDB", value:"5472");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  
@@ -51,8 +53,7 @@
 *** openvas reports this vulnerability using only
 *** information that was gathered.
 
-Solution : Upgrade to a newer version.
-Risk factor: Medium";
+Solution : Upgrade to a newer version.";
 
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/icq_installed.nasl
===================================================================
--- trunk/openvas-plugins/scripts/icq_installed.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/icq_installed.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -25,12 +25,14 @@
 if(description)
 {
  script_id(11425);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2006-03-26 18:10:09 +0200 (Sun, 26 Mar 2006)");
  script_bugtraq_id(1307, 132, 246, 2664, 3226, 3813, 929);
 
 #TODO: too long bugtraq id
  script_cve_id("CVE-1999-1418", "CVE-1999-1440", "CVE-2000-0046", "CVE-2000-0564", "CVE-2000-0552", "CVE-2001-0367", "CVE-2002-0028", "CVE-2001-1305");
  
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
 
@@ -42,8 +44,7 @@
 The remote host is using ICQ - a p2p software, 
 which may not be suitable for a business environment. 
 
-Solution : Uninstall this software
-Risk factor : High";
+Solution : Uninstall this software";
 
 
 

Modified: trunk/openvas-plugins/scripts/kerio_wrf_management_detection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kerio_wrf_management_detection.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/kerio_wrf_management_detection.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -51,6 +51,8 @@
 if (description) {
  script_id(20225);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
  script_tag(name:"cvss_base", value:"1.0");
  script_tag(name:"risk_factor", value:"Low");
 

Modified: trunk/openvas-plugins/scripts/mdksa_2009_009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_009.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/mdksa_2009_009.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63196);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)");
  script_cve_id("CVE-2008-2382", "CVE-2008-5714");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:009 (kvm)";
@@ -51,10 +53,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:009
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:009";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:009 (kvm)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_009.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_044.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_044.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/mdksa_2009_044.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63424);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-23 21:31:14 +0100 (Mon, 23 Feb 2009)");
  script_cve_id("CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0354", "CVE-2009-0355", "CVE-2009-0356", "CVE-2009-0357", "CVE-2009-0358");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Mandrake Security Advisory MDVSA-2009:044 (firefox)";
@@ -56,10 +58,8 @@
 of md5 checksums and GPG signatures is performed automatically for you.
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:044
-http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.6
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.6";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:044 (firefox)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_044.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_071.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_071.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/mdksa_2009_071.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63522);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-13 19:24:56 +0100 (Fri, 13 Mar 2009)");
  script_cve_id("CVE-2009-0675", "CVE-2009-0676");
- script_version ("$");
  script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:071 (kernel)";
@@ -70,10 +72,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:071
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:071";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:071 (kernel)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_071.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_179.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_179.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/mdksa_2009_179.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64522);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2446");
- script_version ("$");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandrake Security Advisory MDVSA-2009:179 (mysql)");
@@ -55,10 +57,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:179
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:179";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:179 (mysql)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_179.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_223_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_223_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/mdksa_2009_223_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66387);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2009-1885");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:223-1 (xerces-c)");
@@ -59,10 +61,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:223-1
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:223-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:223-1 (xerces-c)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_223_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_252_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_252_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/mdksa_2009_252_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66418);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2009-3024");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandriva Security Advisory MDVSA-2009:252-1 (perl-IO-Socket-SSL)");
@@ -57,10 +59,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:252-1
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:252-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:252-1 (perl-IO-Socket-SSL)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_252_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl
===================================================================
--- trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/merak_multiple_vulns.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -25,6 +25,8 @@
 if (description) {
   script_id(14379);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
 
@@ -51,9 +53,7 @@
 vulnerabilities. 
 
 Solution : Upgrade to Merak Webmail / IceWarp Web Mail 5.2.8 or
-Merak Mail Server 7.5.2 or later.
-
-Risk factor : High";
+Merak Mail Server 7.5.2 or later.";
   script_description(desc);
  
   summary = "Checks for Multiple Vulnerabilities in Merak Webmail / IceWarp Web Mail";

Modified: trunk/openvas-plugins/scripts/ms_telnet_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ms_telnet_overflow.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/ms_telnet_overflow.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,6 +28,8 @@
 {
  script_id(102008);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-05 19:43:01 +0200 (Mon, 05 Oct 2009)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_bugtraq_id(4061);


Property changes on: trunk/openvas-plugins/scripts/ms_telnet_overflow.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/netware_perl_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/netware_perl_overflow.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/netware_perl_overflow.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(11827);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(8251);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2003-0562");

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1139.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1139.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1139.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(64374);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-06 20:36:15 +0200 (Mon, 06 Jul 2009)");
  script_cve_id("CVE-2009-1889");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "CentOS Security Advisory CESA-2009:1139 (pidgin)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1139
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1139
-https://rhn.redhat.com/errata/RHSA-2009-1139.html
+https://rhn.redhat.com/errata/RHSA-2009-1139.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:1139 (pidgin)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1139.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/php_fusion_6_00_110.nasl
===================================================================
--- trunk/openvas-plugins/scripts/php_fusion_6_00_110.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/php_fusion_6_00_110.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,6 +29,8 @@
 {
   script_id(20009);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2005-3157", "CVE-2005-3158", "CVE-2005-3160", "CVE-2005-3161");
@@ -48,10 +50,8 @@
   http://archives.neohapsis.com/archives/secunia/2005-q4/0021.html
 
   Solution:
-  Update to at least version 6.00.110 of PHP-Fusion.
+  Update to at least version 6.00.110 of PHP-Fusion.";
 
-  Risk factor:informational";
-
   script_description(desc);
   script_summary("Checks for SQL injection in PHP-Fusion's register.php");
   script_category(ACT_MIXED_ATTACK);

Modified: trunk/openvas-plugins/scripts/phpgroupware_html_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpgroupware_html_injection.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/phpgroupware_html_injection.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(14292);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(8088);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2003-0504");
@@ -51,10 +53,8 @@
 
 Solution : Update to version 0.9.14.005 or newer
 
-See also: http://www.phpgroupware.org/
+See also: http://www.phpgroupware.org/";
 
-Risk factor : Medium";
-
  script_description(desc);
  
  summary = "Checks for PhpGroupWare version";

Modified: trunk/openvas-plugins/scripts/sambar_cgi_path_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sambar_cgi_path_disclosure.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sambar_cgi_path_disclosure.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -33,9 +33,11 @@
 
 if(description)
 {
- script_version ("$Revision$");
  script_tag(name:"risk_factor", value:"Low");
  script_id(11775);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_name("Sambar CGIs path disclosure");
  
  desc = "
@@ -43,10 +45,8 @@
 reveal the installation directory and some other information 
 that could help a cracker.
 
-Solution : remove them
+Solution : remove them";
 
-Risk factor : Low";
-
  script_description(desc);
  
  summary = "Some CGIs reveal the web server installation directory";

Modified: trunk/openvas-plugins/scripts/secpod_3d_ftp_client_dir_traversal_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_3d_ftp_client_dir_traversal_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_3d_ftp_client_dir_traversal_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_3d_ftp_client_dir_travarsal_vuln.nasl 10724 2010-08-25 18:35:24Z aug $
+# $Id$
 #
 # 3D FTP Client Directory Traversal Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902234);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-25 17:02:03 +0200 (Wed, 25 Aug 2010)");
   script_cve_id("CVE-2010-3102");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");


Property changes on: trunk/openvas-plugins/scripts/secpod_3d_ftp_client_dir_traversal_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_alefmentor_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_alefmentor_sql_inj_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_alefmentor_sql_inj_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_alefmentor_sql_inj_vuln.nasl 6151 2009-12-17 18:11:27Z dec $
+# $Id$
 #
 # AlefMentor Multiple SQL Injection Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901071);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-21 07:14:17 +0100 (Mon, 21 Dec 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-4256");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score      : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score  : 6.7
-  Risk factor: High";
+    CVSS Temporal Score  : 6.7";
 
   script_description(desc);
   script_summary("Check the version AlefMentor and SQL Injection");


Property changes on: trunk/openvas-plugins/scripts/secpod_alefmentor_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_apple_itunes_detection_win_900123.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_apple_itunes_detection_win_900123.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_apple_itunes_detection_win_900123.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(900123);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-25 09:10:39 +0200 (Thu, 25 Sep 2008)");
  script_copyright("Copyright (C) 2008 SecPod");
- script_version("Revision: 1.1 ");
   script_tag(name:"risk_factor", value:"None");
  script_category(ACT_GATHER_INFO);
  script_family("General");
@@ -35,9 +37,7 @@
  script_summary("Set File Version of Apple iTunes in KB");
  desc = "
  Overview : This script finds the Apple iTunes installed version of windows 
- from the registry and saves the version in KB.
- 
- Risk factor : None";
+ from the registry and saves the version in KB.";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");


Property changes on: trunk/openvas-plugins/scripts/secpod_apple_itunes_detection_win_900123.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_blackberry_desktop_sec_bypass_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_blackberry_desktop_sec_bypass_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_blackberry_desktop_sec_bypass_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_blackberry_desktop_sec_bypass_vuln.nasl 12722 2011-01-28 10:30:26Z jan $
+# $Id$
 #
 # BlackBerry Desktop Software Information Disclosure Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902329);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-01 16:46:08 +0100 (Tue, 01 Feb 2011)");
   script_cve_id("CVE-2010-2603");
   script_bugtraq_id(45434);
   script_tag(name:"cvss_base", value:"2.1");


Property changes on: trunk/openvas-plugins/scripts/secpod_blackberry_desktop_sec_bypass_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_cscart_sql_injection_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_cscart_sql_injection_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_cscart_sql_injection_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_cscart_sql_injection_vuln.nasl 9589 2010-06-15 14:45:17Z jun $
+# $Id$
 #
 # CS-Cart 'product_id' Parameter SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901123);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-16 08:26:33 +0200 (Wed, 16 Jun 2010)");
   script_cve_id("CVE-2009-4891");
   script_bugtraq_id(34048);
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/secpod_cscart_sql_injection_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_bof_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_bof_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_cyrus_imap_server_bof_vuln.nasl 4628 2010-07-28 16:10:15Z jul $
+# $Id$
 #
 # Cyrus IMAP Server SIEVE Script Handling Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902223);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-02 12:38:17 +0200 (Mon, 02 Aug 2010)");
   script_cve_id("CVE-2009-2632");
   script_bugtraq_id(36296, 36377);
   script_tag(name:"cvss_base", value:"4.4");


Property changes on: trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_dolphin_php_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_dolphin_php_info_disc_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_dolphin_php_info_disc_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_dolphin_php_info_disc_vuln.nasl 17464 2011-09-27 10:05:33Z sep $
+# $Id$
 #
 # Dolphin '.php' Files Information Disclosure Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902735);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-30 15:58:03 +0200 (Fri, 30 Sep 2011)");
   script_cve_id("CVE-2011-3728");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/secpod_dolphin_php_info_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ecoder_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ecoder_xss_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_ecoder_xss_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ecoder_xss_vuln.nasl 15192 2011-06-23 18:16:16Z jun $
+# $Id$
 #
 # ECoder Reflected Cross Site Scripting Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902451);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-24 16:31:03 +0200 (Fri, 24 Jun 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("ECoder Reflected Cross Site Scripting Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/secpod_ecoder_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_firefox_url_spoof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_url_spoof_vuln_win.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_firefox_url_spoof_vuln_win.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_firefox_url_spoof_vuln_win.nasl 1060 2009-02-25 16:05:33Z feb $
+# $Id$
 #
 # Firefox URL Spoofing And Phising Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900513);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-26 05:27:20 +0100 (Thu, 26 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-0652");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.8 (AV:N/AC:M/Au:NR/C:N/I:P/A:P)
-    CVSS Temporal Score : 4.9
-  Risk factor: High";
+    CVSS Temporal Score : 4.9";
 
   script_description(desc);
   script_summary("Check for the version of Mozilla Firefox");


Property changes on: trunk/openvas-plugins/scripts/secpod_firefox_url_spoof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_free_directory_script_file_inclusion_vuln_900181.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_free_directory_script_file_inclusion_vuln_900181.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_free_directory_script_file_inclusion_vuln_900181.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(900181);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-02 11:52:55 +0100 (Tue, 02 Dec 2008)");
   script_copyright("Copyright (C) 2008 SecPod");
-  script_version("Revision: 1.0 ");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_category(ACT_GATHER_INFO);
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 9.0
-  Risk factor: Critical";
+    CVSS Temporal Score : 9.0";
 
  script_description(desc);
  script_dependencies("http_version.nasl");


Property changes on: trunk/openvas-plugins/scripts/secpod_free_directory_script_file_inclusion_vuln_900181.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_google_chrome_mult_vuln_aug10.nasl 10732 2010-08-25 13:14:17 aug $
+# $Id$
 #
 # Google Chrome multiple vulnerabilities - (Aug10)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902096);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-26 15:28:03 +0200 (Thu, 26 Aug 2010)");
   script_cve_id("CVE-2010-3120", "CVE-2010-3119", "CVE-2010-3118", "CVE-2010-3117",
                 "CVE-2010-3116", "CVE-2010-3115", "CVE-2010-3114", "CVE-2010-3113",
                 "CVE-2010-3112", "CVE-2010-3111");


Property changes on: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_aug10.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin_jun11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin_jun11.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin_jun11.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_google_chrome_mult_vuln_lin_jun11.nasl 15894 2011-06-30 12:10:29Z jun $
+# $Id$
 #
 # Google Chrome Multiple Vulnerabilities (Linux) - June 11
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902393);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-01 16:09:45 +0200 (Fri, 01 Jul 2011)");
   script_cve_id("CVE-2011-2345", "CVE-2011-2346", "CVE-2011-2347", "CVE-2011-2348",
                 "CVE-2011-2349", "CVE-2011-2350", "CVE-2011-2351");
   script_bugtraq_id(48479);


Property changes on: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_lin_jun11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_mar11_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_mar11_lin.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_mar11_lin.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_google_chrome_mult_vuln_mar11_lin.nasl 14529 2011-03-29 15:15:15 mar $
+# $Id$
 #
 # Google Chrome multiple vulnerabilities - March 11 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901198);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-01 15:39:52 +0200 (Fri, 01 Apr 2011)");
   script_bugtraq_id(47029);
   script_cve_id("CVE-2011-1291", "CVE-2011-1292", "CVE-2011-1293",
                 "CVE-2011-1294", "CVE-2011-1295", "CVE-2011-1296");


Property changes on: trunk/openvas-plugins/scripts/secpod_google_chrome_mult_vuln_mar11_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ibm_db2_detect_win_900218.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_db2_detect_win_900218.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_ibm_db2_detect_win_900218.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(900218);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-25 09:10:39 +0200 (Thu, 25 Sep 2008)");
  script_copyright("Copyright (C) 2008 SecPod");
- script_version("Revision: 1.2 ");
   script_tag(name:"risk_factor", value:"None");
  script_category(ACT_GATHER_INFO);
  script_family("Service detection");
@@ -35,10 +37,8 @@
  script_summary("Set KB for IBM DB2 Server");
  desc = "
  This script detects the version of IBM DB2 Server and saves the
- results in KB.
+ results in KB.";
 
- Risk factor : None";
-
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");


Property changes on: trunk/openvas-plugins/scripts/secpod_ibm_db2_detect_win_900218.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ibm_was_multiple_vuln_jul11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_was_multiple_vuln_jul11.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_ibm_was_multiple_vuln_jul11.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ibm_was_multiple_vuln_jul11.nasl 16199 2011-07-21 16:35:33Z jul $
+# $Id$
 #
 # IBM WebSphere Application Multiple Vulnerabilities Jul-11
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902457);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-27 09:16:39 +0200 (Wed, 27 Jul 2011)");
   script_cve_id("CVE-2011-1355", "CVE-2011-1356");
   script_bugtraq_id(48709, 48710);
   script_tag(name:"cvss_base", value:"5.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_ibm_was_multiple_vuln_jul11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_jag_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_jag_info_disc_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_jag_info_disc_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_jag_info_disc_vuln.nasl 7361 2010-02-24 11:43:17Z feb $
+# $Id$
 #
 # JAG (Just Another Guestbook) Information Disclosure Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900745);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-26 10:13:54 +0100 (Fri, 26 Feb 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2010-0665");
@@ -59,8 +61,7 @@
 
   CVSS Score:
     CVSS Base Score      : 5.0 (AV:N/AC:L/Au:NR/C:P/I:N/A:N)
-    CVSS Temporal Score  : 4.5
-  Risk factor : Medium";
+    CVSS Temporal Score  : 4.5";
 
   script_description(desc);
   script_copyright("Copyright (C) 2010 SecPod");


Property changes on: trunk/openvas-plugins/scripts/secpod_jag_info_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_joomla_com_jresearch_lfi_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_joomla_com_jresearch_lfi_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_joomla_com_jresearch_lfi_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_joomla_com_jresearch_lfi_vuln.nasl 15771 2011-06-23 16:33:29 jun $
+# $Id$
 #
 # Joomla Component 'com_jresearch' Local File Inclusion Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902386);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-24 16:31:03 +0200 (Fri, 24 Jun 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Joomla Component 'com_jresearch' Local File Inclusion Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/secpod_joomla_com_jresearch_lfi_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_justsystems_ichitaro_prdts_dos_vuln.nasl 16178 2011-07-20 13:25:33Z jul $
+# $Id$
 #
 # JustSystems Ichitaro Products Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902396);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-22 12:16:19 +0200 (Fri, 22 Jul 2011)");
   script_bugtraq_id(48283);
   script_cve_id("CVE-2011-1331");
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_macosx_su11-002.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_macosx_su11-002.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_macosx_su11-002.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_macosx_su11-002.nasl 16513 2011-08-25 14:29:14 aug $
+# $Id$
 #
 # Mac OS X v10.6.7 Multiple Vulnerabilities (2011-002)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902468);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-25 09:25:35 +0200 (Thu, 25 Aug 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_name("Mac OS X v10.6.7 Multiple Vulnerabilities (2011-002)");


Property changes on: trunk/openvas-plugins/scripts/secpod_macosx_su11-002.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms09-042.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-042.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_ms09-042.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms09-042.nasl 3928 2009-08-12 14:17:48Z aug $
+# $Id$
 #
 # Telnet NTLM Credential Reflection Authentication Bypass Vulnerability (960859)
 #
@@ -29,7 +29,9 @@
 if(description)
 {
   script_id(900909);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-12 19:54:51 +0200 (Wed, 12 Aug 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-1930");
@@ -70,8 +72,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the vulnerable file version");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms09-042.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms_ie_mhtml_info_disc_vuln.nasl 13462 2011-01-31 12:40:05Z jan $
+# $Id$
 #
 # Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902285);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-05 04:12:38 +0100 (Sat, 05 Feb 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2011-0096");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms_ie_mhtml_info_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_myre_real_estate_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_myre_real_estate_sql_inj_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_myre_real_estate_sql_inj_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_myre_real_estate_sql_inj_vuln.nasl 16110 2011-07-20 14:14:14Z jul $
+# $Id$
 #
 # MYRE Real Estate Software URL SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902539);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-22 12:16:19 +0200 (Fri, 22 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("MYRE Real Estate Software URL SQL Injection Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/secpod_myre_real_estate_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_php_fusion_team_structure_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_php_fusion_team_structure_sql_inj_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_php_fusion_team_structure_sql_inj_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_php_fusion_sql_inj_vuln.nasl 13341 2011-04-21 18:20:29 apr $
+# $Id$
 #
 # PHP-Fusion Teams Structure Module 'team_id' SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902366);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-02 12:20:04 +0200 (Mon, 02 May 2011)");
   script_cve_id("CVE-2011-0512");
   script_bugtraq_id(45826);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_php_fusion_team_structure_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_spoonftp_retr_cmd_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_spoonftp_retr_cmd_dos_vuln.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_spoonftp_retr_cmd_dos_vuln.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_spoonftp_retr_cmd_dos_vuln.nasl 14437 2011-03-22 15:10:17Z mar $
+# $Id$
 #
 # SpoonFTP 'RETR' Command Remote Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900274);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-25 15:52:06 +0100 (Fri, 25 Mar 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("SpoonFTP 'RETR' Command Remote Denial of Service Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/secpod_spoonftp_retr_cmd_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_info_disc_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_info_disc_vuln_lin.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_info_disc_vuln_lin.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_sun_java_dir_server_info_disc_vuln_lin.nasl 1828 2009-04-29 18:21:29Z apr $
+# $Id$
 #
 # Sun Java Directory Server Information Disclosure Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900706);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-30 06:40:16 +0200 (Thu, 30 Apr 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-1332");
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:P/I:N/A:N)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of Java Directory Server");


Property changes on: trunk/openvas-plugins/scripts/secpod_sun_java_dir_server_info_disc_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_tor_dir_queries_info_disc_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_tor_dir_queries_info_disc_vuln_win.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/secpod_tor_dir_queries_info_disc_vuln_win.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_tor_dir_queries_info_disc_vuln_win.nasl 6967 2010-01-28 20:49:29Z jan $
+# $Id$
 #
 # Tor Directory Queries Information Disclosure Vulnerability (win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901100);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-28 16:24:05 +0100 (Thu, 28 Jan 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2010-0383", "CVE-2010-0385");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.7
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.7";
 
   script_description(desc);
   script_summary("Check for the version of Tor");


Property changes on: trunk/openvas-plugins/scripts/secpod_tor_dir_queries_info_disc_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/skullsplitter_html_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/skullsplitter_html_injection.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/skullsplitter_html_injection.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(18265);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(13632);
- script_version ("$Revision$");
  script_tag(name:"risk_factor", value:"Medium");
 
  name = "Skull-Splitter Guestbook Multiple HTML Injection Vulnerabilities";
@@ -41,8 +43,7 @@
 party users, thus resulting in a loss of integrity of their 
 system.
 
-Solution : None at this time
-Risk factor : Medium";
+Solution : None at this time";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/sles10_dbus-1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_dbus-1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sles10_dbus-1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65759);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2008-4311");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for dbus");
@@ -57,10 +59,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for dbus");


Property changes on: trunk/openvas-plugins/scripts/sles10_dbus-1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_dhcp0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_dhcp0.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sles10_dhcp0.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65863);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2007-0062");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for DHCP");
@@ -52,10 +54,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for DHCP");


Property changes on: trunk/openvas-plugins/scripts/sles10_dhcp0.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_openssl0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssl0.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sles10_openssl0.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65793);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES10: Security update for OpenSSL");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for OpenSSL");


Property changes on: trunk/openvas-plugins/scripts/sles10_openssl0.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5013784.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013784.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sles9p5013784.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65139);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for a2ps");
 
@@ -45,10 +47,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for a2ps");


Property changes on: trunk/openvas-plugins/scripts/sles9p5013784.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5017442.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5017442.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sles9p5017442.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65510);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Apache 2");
 
@@ -47,10 +49,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Apache 2");


Property changes on: trunk/openvas-plugins/scripts/sles9p5017442.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5017619.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5017619.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sles9p5017619.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65197);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-2471");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for netpbm and libnetpbm");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for netpbm and libnetpbm");


Property changes on: trunk/openvas-plugins/scripts/sles9p5017619.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5041680.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5041680.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/sles9p5041680.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65425);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2008-5907");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for libpng, libpng-devel");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for libpng, libpng-devel");


Property changes on: trunk/openvas-plugins/scripts/sles9p5041680.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/teso_telnet.nasl
===================================================================
--- trunk/openvas-plugins/scripts/teso_telnet.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/teso_telnet.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -30,9 +30,11 @@
 
 if (description) {
    script_id(10709);
+   script_version("$Revision$");
+   script_tag(name:"last_modification", value:"$Date$");
+   script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
    script_xref(name:"IAVA", value:"2001-t-0008");
    script_bugtraq_id(3064);
-   script_version ("$Revision$");
    script_tag(name:"cvss_base", value:"10.0");
    script_tag(name:"risk_factor", value:"Critical");
    script_cve_id("CVE-2001-0554");
@@ -50,8 +52,7 @@
 For more information, see:
 http://www.team-teso.net/advisories/teso-advisory-011.tar.gz
 
-Solution: Comment out the 'telnet' line in /etc/inetd.conf.
-Risk factor: Critical";
+Solution: Comment out the 'telnet' line in /etc/inetd.conf.";
   script_description(desc);
  
   summary = "Attempts to overflow the Telnet server buffer";

Modified: trunk/openvas-plugins/scripts/ubuntu_735_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_735_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/ubuntu_735_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63621);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)");
  script_cve_id("CVE-2009-0586", "CVE-2009-0585", "CVE-2009-0135", "CVE-2009-0136", "CVE-2008-4564", "CVE-2009-0538", "CVE-2004-2761");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-735-1 (gst-plugins-base0.10)";
@@ -55,10 +57,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-735-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-735-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Ubuntu USN-735-1 (gst-plugins-base0.10)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_735_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_740_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_740_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/ubuntu_740_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63624);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)");
  script_cve_id("CVE-2004-2761");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-740-1 (firefox)";
@@ -64,10 +66,8 @@
 After a standard system upgrade you need to restart your session to
 effect the necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-740-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-740-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Ubuntu USN-740-1 (firefox)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_740_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_862_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_862_1.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/ubuntu_862_1.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66338);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-03 22:10:42 +0100 (Thu, 03 Dec 2009)");
  script_cve_id("CVE-2008-7068", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4018");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-862-1 (php5)");
@@ -108,10 +110,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-862-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-862-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Ubuntu USN-862-1 (php5)");


Property changes on: trunk/openvas-plugins/scripts/ubuntu_862_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/webalbum_local_file_include.nasl
===================================================================
--- trunk/openvas-plugins/scripts/webalbum_local_file_include.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/webalbum_local_file_include.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -56,7 +56,9 @@
 
 if (description) {
   script_id(80094);;
-  script_version("$Revision: 1.2 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
   script_tag(name:"cvss_base", value:"5.1");
   script_tag(name:"risk_factor", value:"High");
   script_bugtraq_id(17228);


Property changes on: trunk/openvas-plugins/scripts/webalbum_local_file_include.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/xnews.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xnews.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/xnews.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -24,10 +24,12 @@
 
 if(description)
 {
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_id(12068);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2002-1656");
  script_bugtraq_id(4283);
  name = "x-news 1";

Modified: trunk/openvas-plugins/scripts/zabbix_37308.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zabbix_37308.nasl	2011-11-03 17:38:19 UTC (rev 11980)
+++ trunk/openvas-plugins/scripts/zabbix_37308.nasl	2011-11-03 17:47:29 UTC (rev 11981)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100404);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-17 19:46:08 +0100 (Thu, 17 Dec 2009)");
  script_cve_id("CVE-2009-4500");
  script_bugtraq_id(37308);
- script_version ("1.0-$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
 
@@ -51,10 +53,8 @@
 References:
 http://www.zabbix.com/index.php
 http://secunia.com/advisories/37740/
-https://support.zabbix.com/browse/ZBX-993
+https://support.zabbix.com/browse/ZBX-993";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if ZABBIX is prone to a denial-of-service vulnerability");
  script_category(ACT_MIXED_ATTACK);


Property changes on: trunk/openvas-plugins/scripts/zabbix_37308.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision



More information about the Openvas-commits mailing list