[Openvas-commits] r11994 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Nov 4 16:36:43 CET 2011


Author: hdoreau
Date: 2011-11-04 16:35:09 +0100 (Fri, 04 Nov 2011)
New Revision: 11994

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/Beerwins_PhpLinkAdmin_1_0.nasl
   trunk/openvas-plugins/scripts/Cryptographp_local_file_include.nasl
   trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0005.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1651.nasl
   trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl
   trunk/openvas-plugins/scripts/centreon_37383.nasl
   trunk/openvas-plugins/scripts/check_dns_tcp.nasl
   trunk/openvas-plugins/scripts/cups_multiple_vulnerabilities.nasl
   trunk/openvas-plugins/scripts/deb_013_1.nasl
   trunk/openvas-plugins/scripts/deb_021_1.nasl
   trunk/openvas-plugins/scripts/deb_080_1.nasl
   trunk/openvas-plugins/scripts/deb_1260_1.nasl
   trunk/openvas-plugins/scripts/deb_1361_1.nasl
   trunk/openvas-plugins/scripts/deb_1380_1.nasl
   trunk/openvas-plugins/scripts/deb_144_1.nasl
   trunk/openvas-plugins/scripts/deb_145_1.nasl
   trunk/openvas-plugins/scripts/deb_1539_1.nasl
   trunk/openvas-plugins/scripts/deb_1667_1.nasl
   trunk/openvas-plugins/scripts/deb_1704_2.nasl
   trunk/openvas-plugins/scripts/deb_1713_1.nasl
   trunk/openvas-plugins/scripts/deb_1755_1.nasl
   trunk/openvas-plugins/scripts/deb_1778_1.nasl
   trunk/openvas-plugins/scripts/deb_1828_1.nasl
   trunk/openvas-plugins/scripts/deb_1958_1.nasl
   trunk/openvas-plugins/scripts/deb_1968_2.nasl
   trunk/openvas-plugins/scripts/deb_2063_1.nasl
   trunk/openvas-plugins/scripts/deb_2091_1.nasl
   trunk/openvas-plugins/scripts/deb_2123_1.nasl
   trunk/openvas-plugins/scripts/deb_2173_1.nasl
   trunk/openvas-plugins/scripts/deb_2205_1.nasl
   trunk/openvas-plugins/scripts/deb_278_1.nasl
   trunk/openvas-plugins/scripts/deb_286_1.nasl
   trunk/openvas-plugins/scripts/deb_312_1.nasl
   trunk/openvas-plugins/scripts/deb_412_1.nasl
   trunk/openvas-plugins/scripts/deb_419_1.nasl
   trunk/openvas-plugins/scripts/deb_524_1.nasl
   trunk/openvas-plugins/scripts/deb_593_1.nasl
   trunk/openvas-plugins/scripts/deb_980_1.nasl
   trunk/openvas-plugins/scripts/eggdrop_24070.nasl
   trunk/openvas-plugins/scripts/fcore_2009_0331.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10466.nasl
   trunk/openvas-plugins/scripts/fcore_2009_11490.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12782.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1517.nasl
   trunk/openvas-plugins/scripts/fcore_2009_2417.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5509.nasl
   trunk/openvas-plugins/scripts/firestats_35367.nasl
   trunk/openvas-plugins/scripts/freebsd_acroread1.nasl
   trunk/openvas-plugins/scripts/freebsd_apr.nasl
   trunk/openvas-plugins/scripts/freebsd_bidwatcher.nasl
   trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl
   trunk/openvas-plugins/scripts/freebsd_drupal3.nasl
   trunk/openvas-plugins/scripts/freebsd_ethereal.nasl
   trunk/openvas-plugins/scripts/freebsd_f2c.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox20.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox21.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox40.nasl
   trunk/openvas-plugins/scripts/freebsd_freetype20.nasl
   trunk/openvas-plugins/scripts/freebsd_imwheel.nasl
   trunk/openvas-plugins/scripts/freebsd_irssi.nasl
   trunk/openvas-plugins/scripts/freebsd_jabberd0.nasl
   trunk/openvas-plugins/scripts/freebsd_jabberd1.nasl
   trunk/openvas-plugins/scripts/freebsd_krb54.nasl
   trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-opera4.nasl
   trunk/openvas-plugins/scripts/freebsd_mplayer9.nasl
   trunk/openvas-plugins/scripts/freebsd_p5-DBI.nasl
   trunk/openvas-plugins/scripts/freebsd_pivot-weblog.nasl
   trunk/openvas-plugins/scripts/freebsd_png3.nasl
   trunk/openvas-plugins/scripts/freebsd_rssh.nasl
   trunk/openvas-plugins/scripts/freebsd_samba12.nasl
   trunk/openvas-plugins/scripts/freebsd_trac2.nasl
   trunk/openvas-plugins/scripts/freebsd_vlc4.nasl
   trunk/openvas-plugins/scripts/freebsd_wireshark5.nasl
   trunk/openvas-plugins/scripts/freebsd_xtrlock.nasl
   trunk/openvas-plugins/scripts/freebsdsa_jail2.nasl
   trunk/openvas-plugins/scripts/freebsdsa_nd6.nasl
   trunk/openvas-plugins/scripts/freebsdsa_openssl5.nasl
   trunk/openvas-plugins/scripts/freebsdsa_zfs.nasl
   trunk/openvas-plugins/scripts/ftpd_any_cmd.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2007_1049_kernel_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0240_xpdf_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0288_samba_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0584_pidgin_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0908_thunderbird_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0946_ed_centos4_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0977_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0430_xpdf_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_1671_kernel_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0162_openssl_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1089_systemtap_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0240-01_xpdf.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0892-01_xen.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0002-01_PyXML.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0547-01_firefox.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0679-01_rpm.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1359-01_xorg-x11-server.nasl
   trunk/openvas-plugins/scripts/gb_adobe_flash_player_swf_proc_vuln.nasl
   trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_vuln_feb10_lin.nasl
   trunk/openvas-plugins/scripts/gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_bugzilla_45982.nasl
   trunk/openvas-plugins/scripts/gb_ccproxy_detect.nasl
   trunk/openvas-plugins/scripts/gb_clamav_remote_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_cruxcms_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_f-prot_av_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_family_connections_40043.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_100_ed_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2649_drupal_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_3666_phpMyAdmin_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_4305_eggdrop_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_614_libexif_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_1629_kernel-xen-2.6_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_1728_scponly_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_2616_libsilc_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_5454_kernel_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_6127_openvrml_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_9791_htop_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_0964_gzip_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_10083_dhcp_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_10361_gnome-python2-extras_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_10469_mingw32-libtiff_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_10876_kernel_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_11428_maniadrive_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_12269_roundup_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14235_kernel_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14236_squid_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14411_phpMyAdmin_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_15070_gnome-web-photo_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_15534_cgit_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1720_systemtap_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_18890_seamonkey_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_19330_wordpress-mu_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_4407_hamlib_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_5545_libnids_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_6096_oxygen-icon-theme_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_8805_krb5_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_9320_xinha_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_0120_Django_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11084_mozvoikko_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11087_thunderbird-lightning_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11189_hplip_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_2743_clamav_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_3827_libtiff_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8021_fetchmail_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8647_gnome-web-photo_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_9132_phpMyAdmin_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_9311_squirrelmail_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_9891_dbus_fc15.nasl
   trunk/openvas-plugins/scripts/gb_firefox_keygen_dos_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_firestats_41548.nasl
   trunk/openvas-plugins/scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_gizmo5_detect_lin.nasl
   trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_aug11_macosx.nasl
   trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_oct11_win.nasl
   trunk/openvas-plugins/scripts/gb_hp_power_manager_csrf_vuln.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02408.nasl
   trunk/openvas-plugins/scripts/gb_interchange_web_detect.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_048_1.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_096.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_124.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_097.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_062.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_088.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_099.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_000.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_032.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_234.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_252.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_036.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_106.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_148.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_sep11_win02.nasl
   trunk/openvas-plugins/scripts/gb_ms07-042.nasl
   trunk/openvas-plugins/scripts/gb_ms_kernel_prv_esc_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ms_windows_media_player_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ms_windows_stuxnet_unspecified_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ocs_inventory_35593.nasl
   trunk/openvas-plugins/scripts/gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_php_31612.nasl
   trunk/openvas-plugins/scripts/gb_php_crypt_func_sec_bypass_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_php_imap_do_open_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_pligg_cms_41729.nasl
   trunk/openvas-plugins/scripts/gb_prtg_network_monitor_detect.nasl
   trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_mar09_lin.nasl
   trunk/openvas-plugins/scripts/gb_serva32_web_server_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_solaris_109668_07.nasl
   trunk/openvas-plugins/scripts/gb_solaris_110916_07.nasl
   trunk/openvas-plugins/scripts/gb_solaris_111647_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_111882_03.nasl
   trunk/openvas-plugins/scripts/gb_solaris_114265_19.nasl
   trunk/openvas-plugins/scripts/gb_solaris_114432_34.nasl
   trunk/openvas-plugins/scripts/gb_solaris_114636_04.nasl
   trunk/openvas-plugins/scripts/gb_solaris_114984_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_118918_24.nasl
   trunk/openvas-plugins/scripts/gb_solaris_119903_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_125332_06.nasl
   trunk/openvas-plugins/scripts/gb_solaris_138827_06.nasl
   trunk/openvas-plugins/scripts/gb_solaris_141415_10.nasl
   trunk/openvas-plugins/scripts/gb_solaris_142676_02.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_475_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_579_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_4.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_876_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_1.nasl
   trunk/openvas-plugins/scripts/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_webid_48554.nasl
   trunk/openvas-plugins/scripts/gb_wow_activex_mult_remote_code_exec_vuln.nasl
   trunk/openvas-plugins/scripts/glsa_200503_07.nasl
   trunk/openvas-plugins/scripts/glsa_200510_12.nasl
   trunk/openvas-plugins/scripts/glsa_200510_23.nasl
   trunk/openvas-plugins/scripts/glsa_200511_12.nasl
   trunk/openvas-plugins/scripts/glsa_200612_02.nasl
   trunk/openvas-plugins/scripts/glsa_200703_24.nasl
   trunk/openvas-plugins/scripts/glsa_200710_04.nasl
   trunk/openvas-plugins/scripts/glsa_200710_06.nasl
   trunk/openvas-plugins/scripts/glsa_200802_08.nasl
   trunk/openvas-plugins/scripts/glsa_200803_03.nasl
   trunk/openvas-plugins/scripts/glsa_201006_02.nasl
   trunk/openvas-plugins/scripts/hp_power_manager_mult_remote_code_execution.nasl
   trunk/openvas-plugins/scripts/iis_dot_cnf.nasl
   trunk/openvas-plugins/scripts/ilohamail_attachment_upload.nasl
   trunk/openvas-plugins/scripts/jolt2.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_032.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_098.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_158_2.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_263.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_290_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_299.nasl
   trunk/openvas-plugins/scripts/myserver_traversal.nasl
   trunk/openvas-plugins/scripts/nanocms_detect.nasl
   trunk/openvas-plugins/scripts/novell_groupwise_webacc_information_disclosure.nasl
   trunk/openvas-plugins/scripts/openssh_afs.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0457.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1116.nasl
   trunk/openvas-plugins/scripts/owa-anonymous.nasl
   trunk/openvas-plugins/scripts/php_split_mime.nasl
   trunk/openvas-plugins/scripts/phpadsnew_xss.nasl
   trunk/openvas-plugins/scripts/scripteen_multiple.nasl
   trunk/openvas-plugins/scripts/secpod_atlassian_jira_detect.nasl
   trunk/openvas-plugins/scripts/secpod_audacity_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_dos_vuln_sep09_lin.nasl
   trunk/openvas-plugins/scripts/secpod_google_chrome_getsvgdocument_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln_may10.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_db2_repeat_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_mantis_mult_lfi_n_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_metaserver_rt_multiple_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_mikmod_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-074.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-038.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-038.nasl
   trunk/openvas-plugins/scripts/secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_oracle_http_server_xss_header_injection_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl
   trunk/openvas-plugins/scripts/secpod_realvnc_remote_code_exe_vuln_win_900162.nasl
   trunk/openvas-plugins/scripts/secpod_squirrelmail_cmd_exec_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_strongswan_n_openswan_dos_vuln_jun09.nasl
   trunk/openvas-plugins/scripts/secpod_sun_java_se_mult_vuln_nov09_win.nasl
   trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl
   trunk/openvas-plugins/scripts/secpod_wintftp_server_dir_trav_vuln.nasl
   trunk/openvas-plugins/scripts/sendcard_sql.nasl
   trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl
   trunk/openvas-plugins/scripts/sles10_cups2.nasl
   trunk/openvas-plugins/scripts/sles11_clamav1.nasl
   trunk/openvas-plugins/scripts/sles11_libapr-util1.nasl
   trunk/openvas-plugins/scripts/sles11_libvolume_id1.nasl
   trunk/openvas-plugins/scripts/sles11_xerces-j2.nasl
   trunk/openvas-plugins/scripts/sles9p5009300.nasl
   trunk/openvas-plugins/scripts/sles9p5012769.nasl
   trunk/openvas-plugins/scripts/sles9p5012976.nasl
   trunk/openvas-plugins/scripts/sles9p5013049.nasl
   trunk/openvas-plugins/scripts/sles9p5016198.nasl
   trunk/openvas-plugins/scripts/sles9p5020045.nasl
   trunk/openvas-plugins/scripts/sles9p5020679.nasl
   trunk/openvas-plugins/scripts/sles9p5043440.nasl
   trunk/openvas-plugins/scripts/sles9p5043892.nasl
   trunk/openvas-plugins/scripts/squid_rdos.nasl
   trunk/openvas-plugins/scripts/ssh_proto_version.nasl
   trunk/openvas-plugins/scripts/subversion_1_0_6.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl
   trunk/openvas-plugins/scripts/taifajobs_1_0_jobid_sql_injection.nasl
   trunk/openvas-plugins/scripts/tftp_files_hp_ignite_ux.nasl
   trunk/openvas-plugins/scripts/ubuntu_771_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_787_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_796_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_811_1.nasl
   trunk/openvas-plugins/scripts/upnp_xp.nasl
   trunk/openvas-plugins/scripts/win_CVE-2008-0080.nasl
   trunk/openvas-plugins/scripts/wu_ftpd_rnfr_file_overwrite.nasl
Log:
* scripts/freebsdsa_openssl5.nasl,
scripts/gb_RHSA-2010_0002-01_PyXML.nasl,
scripts/nanocms_detect.nasl,
scripts/gb_fedora_2010_6096_oxygen-icon-theme_fc12.nasl,
scripts/glsa_200710_06.nasl,
scripts/Beerwins_PhpLinkAdmin_1_0.nasl,
scripts/gb_hp_ux_HPSBUX02306.nasl,
scripts/gb_fedora_2011_8021_fetchmail_fc14.nasl,
scripts/sles9p5020045.nasl,
scripts/gb_fedora_2010_14235_kernel_fc13.nasl,
scripts/sles9p5043440.nasl,
scripts/gb_fedora_2011_9132_phpMyAdmin_fc15.nasl,
scripts/sles9p5043892.nasl,
scripts/gb_fedora_2010_11428_maniadrive_fc12.nasl,
scripts/freebsd_firefox21.nasl,
scripts/mdksa_2009_158_2.nasl,
scripts/deb_1667_1.nasl,
scripts/firestats_35367.nasl,
scripts/gb_CESA-2010_0162_openssl_centos5_i386.nasl,
scripts/secpod_realplayer_swf_bof_vuln_900015.nasl,
scripts/gb_fedora_2010_8805_krb5_fc12.nasl,
scripts/freebsd_krb54.nasl,
scripts/gb_solaris_111647_01.nasl,
scripts/gb_CESA-2009_1671_kernel_centos4_i386.nasl,
scripts/deb_1361_1.nasl,
scripts/deb_2123_1.nasl,
scripts/gb_solaris_111882_03.nasl,
scripts/gb_fedora_2011_3827_libtiff_fc13.nasl,
scripts/gb_mandriva_MDVSA_2011_106.nasl,
scripts/gb_fedora_2008_6127_openvrml_fc8.nasl,
scripts/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl,
scripts/gb_fedora_2011_9891_dbus_fc15.nasl,
scripts/deb_1755_1.nasl,
scripts/ubuntu_771_1.nasl,
scripts/freebsd_irssi.nasl,
scripts/gb_fedora_2008_5454_kernel_fc8.nasl,
scripts/taifajobs_1_0_jobid_sql_injection.nasl,
scripts/freebsd_ethereal.nasl,
scripts/secpod_metaserver_rt_multiple_dos_vuln.nasl,
scripts/gb_fedora_2007_614_libexif_fc6.nasl,
scripts/sles9p5012976.nasl,
scripts/secpod_ibm_db2_repeat_bof_vuln_win.nasl,
scripts/basilix_message_content_script_injection.nasl,
scripts/openssh_afs.nasl,
scripts/gb_hp_ux_HPSBUX02408.nasl,
scripts/gb_CESA-2008_0977_seamonkey_centos4_i386.nasl,
scripts/secpod_sun_java_se_mult_vuln_nov09_win.nasl,
scripts/mdksa_2009_299.nasl,
scripts/glsa_200803_03.nasl,
scripts/gb_solaris_142676_02.nasl,
scripts/sles11_libapr-util1.nasl,
scripts/gb_firefox_keygen_dos_vuln_lin.nasl,
scripts/gb_adobe_flash_player_swf_proc_vuln.nasl,
scripts/secpod_ms10-038.nasl,
scripts/deb_144_1.nasl,
scripts/deb_1260_1.nasl,
scripts/gb_bugzilla_45982.nasl,
scripts/gb_f-prot_av_dos_vuln.nasl,
scripts/sles11_clamav1.nasl,
scripts/deb_312_1.nasl,
scripts/squid_rdos.nasl,
scripts/iis_dot_cnf.nasl,
scripts/gb_fedora_2010_15534_cgit_fc13.nasl,
scripts/ubuntu_787_1.nasl,
scripts/fcore_2009_1517.nasl,
scripts/freebsd_wireshark5.nasl,
scripts/upnp_xp.nasl,
scripts/mdksa_2009_098.nasl,
scripts/freebsd_jabberd1.nasl,
scripts/gb_mandriva_MDVSA_2010_252.nasl,
scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl,
scripts/RHSA_2009_0459.nasl,
scripts/subversion_1_0_6.nasl,
scripts/secpod_ms11-038.nasl,
scripts/gb_fedora_2010_14236_squid_fc12.nasl,
scripts/deb_080_1.nasl,
scripts/gb_mandriva_MDVSA_2011_036.nasl,
scripts/phpadsnew_xss.nasl,
scripts/deb_1713_1.nasl,
scripts/gb_mandriva_MDVA_2010_099.nasl,
scripts/hp_power_manager_mult_remote_code_execution.nasl,
scripts/secpod_mantis_mult_lfi_n_xss_vuln.nasl,
scripts/gb_CESA-2008_0240_xpdf_centos4_x86_64.nasl,
scripts/gb_RHSA-2011_1359-01_xorg-x11-server.nasl,
scripts/freebsd_cvs+ipv60.nasl,
scripts/eggdrop_24070.nasl,
scripts/gb_solaris_125332_06.nasl,
scripts/gb_fedora_2010_15070_gnome-web-photo_fc13.nasl,
scripts/freebsd_samba12.nasl,
scripts/gb_fedora_2007_2649_drupal_fc7.nasl,
scripts/gb_ocs_inventory_35593.nasl,
scripts/gb_mandriva_MDKA_2007_096.nasl,
scripts/RHSA_2009_0005.nasl,
scripts/gb_mozilla_prdts_mult_vuln_sep11_win02.nasl,
scripts/tftp_files_hp_ignite_ux.nasl,
scripts/gb_RHSA-2010_0679-01_rpm.nasl,
scripts/win_CVE-2008-0080.nasl,
scripts/glsa_200703_24.nasl,
scripts/sles9p5016198.nasl,
scripts/deb_524_1.nasl,
scripts/gb_solaris_109668_07.nasl,
scripts/gb_webid_48554.nasl,
scripts/gb_mandriva_MDKA_2007_124.nasl,
scripts/gb_fedora_2010_5545_libnids_fc11.nasl,
scripts/freebsd_acroread1.nasl,
scripts/ubuntu_796_1.nasl,
scripts/deb_593_1.nasl,
scripts/glsa_201006_02.nasl,
scripts/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl,
scripts/ilohamail_attachment_upload.nasl,
scripts/freebsdsa_zfs.nasl,
scripts/gb_prtg_network_monitor_detect.nasl,
scripts/freebsd_apr.nasl,
scripts/secpod_google_chrome_getsvgdocument_xss_vuln.nasl,
scripts/gb_fedora_2010_0964_gzip_fc11.nasl,
scripts/sles10_cups2.nasl,
scripts/secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl,
scripts/gb_firestats_41548.nasl,
scripts/gb_solaris_118918_24.nasl,
scripts/fcore_2009_10466.nasl,
scripts/mdksa_2009_263.nasl,
scripts/fcore_2009_0331.nasl,
scripts/deb_1704_2.nasl,
scripts/gb_CESA-2008_0584_pidgin_centos3_i386.nasl,
scripts/gb_CESA-2008_0946_ed_centos4_x86_64.nasl,
scripts/freebsdsa_jail2.nasl,
scripts/freebsd_jabberd0.nasl,
scripts/glsa_200510_23.nasl,
scripts/freebsd_bidwatcher.nasl,
scripts/glsa_200710_04.nasl,
scripts/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl,
scripts/gb_ubuntu_USN_511_2.nasl,
scripts/deb_1778_1.nasl,
scripts/gb_clamav_remote_dos_vuln.nasl,
scripts/gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl,
scripts/secpod_mikmod_dos_vuln.nasl,
scripts/sendcard_sql.nasl,
scripts/gb_fedora_2011_11087_thunderbird-lightning_fc15.nasl,
scripts/myserver_traversal.nasl,
scripts/gb_hp_power_manager_csrf_vuln.nasl,
scripts/gb_mandriva_MDKA_2007_048_1.nasl,
scripts/gb_family_connections_40043.nasl,
scripts/deb_021_1.nasl,
scripts/gb_solaris_114636_04.nasl,
scripts/fcore_2009_5509.nasl,
scripts/secpod_ms08-074.nasl,
scripts/gb_gizmo5_detect_lin.nasl,
scripts/fcore_2009_2417.nasl,
scripts/owa-anonymous.nasl,
scripts/gb_hp_ux_HPSBUX00148.nasl,
scripts/gb_mandriva_MDVA_2008_062.nasl,
scripts/glsa_200802_08.nasl,
scripts/gb_solaris_141415_10.nasl,
scripts/gb_fedora_2008_9791_htop_fc8.nasl,
scripts/gb_ms07-042.nasl,
scripts/freebsd_xtrlock.nasl,
scripts/gb_solaris_114984_02.nasl,
scripts/gb_cruxcms_xss_vuln.nasl,
scripts/ovcesa2009_1116.nasl,
scripts/gb_ccproxy_detect.nasl,
scripts/gb_fedora_2010_1720_systemtap_fc12.nasl,
scripts/gb_adobe_prdts_mult_vuln_feb10_lin.nasl,
scripts/freebsd_imwheel.nasl,
scripts/freebsd_drupal3.nasl,
scripts/gb_fedora_2010_10876_kernel_fc13.nasl,
scripts/deb_412_1.nasl,
scripts/freebsd_vlc4.nasl,
scripts/gb_RHSA-2008_0892-01_xen.nasl,
scripts/gb_mandriva_MDVA_2010_088.nasl,
scripts/deb_1380_1.nasl,
scripts/glsa_200511_12.nasl,
scripts/gb_pligg_cms_41729.nasl,
scripts/deb_1828_1.nasl,
scripts/gb_fedora_2010_19330_wordpress-mu_fc13.nasl,
scripts/sles9p5013049.nasl,
scripts/php_split_mime.nasl,
scripts/gb_fedora_2011_2743_clamav_fc14.nasl,
scripts/deb_1539_1.nasl,
scripts/gb_php_crypt_func_sec_bypass_vuln_win.nasl,
scripts/freebsd_linux-opera4.nasl,
scripts/gb_wow_activex_mult_remote_code_exec_vuln.nasl,
scripts/freebsd_firefox40.nasl,
scripts/gb_fedora_2010_10469_mingw32-libtiff_fc12.nasl,
scripts/deb_278_1.nasl,
scripts/ovcesa2009_0457.nasl,
scripts/deb_980_1.nasl,
scripts/gb_fedora_2010_4407_hamlib_fc12.nasl,
scripts/freebsd_firefox20.nasl,
scripts/secpod_wintftp_server_dir_trav_vuln.nasl,
scripts/gb_ubuntu_USN_876_1.nasl,
scripts/gb_google_chrome_mult_vuln_oct11_win.nasl,
scripts/deb_2091_1.nasl,
scripts/gb_ms_windows_media_player_bof_vuln.nasl,
scripts/RHSA_2009_1651.nasl,
scripts/gb_fedora_2007_4305_eggdrop_fc8.nasl,
scripts/ftpd_any_cmd.nasl,
scripts/sles9p5009300.nasl,
scripts/gb_fedora_2010_10361_gnome-python2-extras_fc13.nasl,
scripts/freebsd_mplayer9.nasl,
scripts/secpod_realvnc_remote_code_exe_vuln_win_900162.nasl,
scripts/mdksa_2009_290_1.nasl,
scripts/freebsd_trac2.nasl,
scripts/glsa_200510_12.nasl,
scripts/secpod_audacity_bof_vuln_win.nasl,
scripts/sles9p5020679.nasl,
scripts/mdksa_2009_197_2.nasl,
scripts/gb_CESA-2009_0430_xpdf_centos4_i386.nasl,
scripts/deb_2063_1.nasl,
scripts/gb_mandriva_MDVA_2011_000.nasl,
scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl,
scripts/gb_fedora_2011_11189_hplip_fc15.nasl,
scripts/gb_fedora_2008_2616_libsilc_fc7.nasl,
scripts/sles9p5012769.nasl,
scripts/gb_ubuntu_USN_475_1.nasl,
scripts/gb_RHSA-2010_0547-01_firefox.nasl,
scripts/gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl,
scripts/gb_google_chrome_mult_vuln_aug11_macosx.nasl,
scripts/mdksa_2009_032.nasl,
scripts/secpod_strongswan_n_openswan_dos_vuln_jun09.nasl,
scripts/gb_solaris_119903_02.nasl,
scripts/centreon_37383.nasl,
scripts/gb_interchange_web_detect.nasl,
scripts/freebsd_pivot-weblog.nasl,
scripts/gb_ubuntu_USN_890_1.nasl,
scripts/deb_1968_2.nasl,
scripts/secpod_oracle_http_server_xss_header_injection_vuln.nasl,
scripts/deb_419_1.nasl,
scripts/deb_013_1.nasl,
scripts/gb_solaris_114432_34.nasl,
scripts/sles11_libvolume_id1.nasl,
scripts/freebsd_png3.nasl,
scripts/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl,
scripts/Cryptographp_local_file_include.nasl,
scripts/secpod_novell_iprint_client_mult_bof_vuln_win.nasl,
scripts/novell_groupwise_webacc_information_disclosure.nasl,
scripts/gb_ubuntu_USN_579_1.nasl,
scripts/gb_fedora_2010_18890_seamonkey_fc13.nasl,
scripts/ubuntu_811_1.nasl,
scripts/gb_fedora_2010_9320_xinha_fc13.nasl,
scripts/gb_fedora_2010_10083_dhcp_fc11.nasl,
scripts/freebsd_libvorbis1.nasl,
scripts/glsa_200612_02.nasl,
scripts/fcore_2009_12782.nasl,
scripts/deb_145_1.nasl,
scripts/jolt2.nasl,
scripts/gb_seamonkey_mult_vuln_mar09_lin.nasl,
scripts/gb_serva32_web_server_dos_vuln.nasl,
scripts/gb_solaris_114265_19.nasl,
scripts/deb_1958_1.nasl,
scripts/gb_fedora_2010_14411_phpMyAdmin_fc12.nasl,
scripts/DDI_PIX_Firewall_Manager.nasl,
scripts/suse_sr_2009_009.nasl,
scripts/secpod_squirrelmail_cmd_exec_vuln.nasl,
scripts/freebsdsa_nd6.nasl,
scripts/freebsd_rssh.nasl,
scripts/gb_mandriva_MDVSA_2008_032.nasl,
scripts/gb_fedora_2011_9311_squirrelmail_fc15.nasl,
scripts/gb_ubuntu_USN_428_1.nasl,
scripts/freebsd_freetype20.nasl,
scripts/ssh_proto_version.nasl,
scripts/gb_php_imap_do_open_dos_vuln.nasl,
scripts/freebsd_f2c.nasl,
scripts/gb_RHSA-2008_0240-01_xpdf.nasl,
scripts/gb_CESA-2008_0288_samba_centos3_i386.nasl,
scripts/gb_php_31612.nasl,
scripts/gb_fedora_2010_12269_roundup_fc12.nasl,
scripts/gb_fedora_2008_1728_scponly_fc7.nasl,
scripts/secpod_firefox_dos_vuln_sep09_lin.nasl,
scripts/glsa_200503_07.nasl,
scripts/gb_CESA-2011_1089_systemtap_centos5_i386.nasl,
scripts/gb_solaris_110916_07.nasl,
scripts/gb_fedora_2007_100_ed_fc6.nasl,
scripts/gb_CESA-2007_1049_kernel_centos3_i386.nasl,
scripts/scripteen_multiple.nasl,
scripts/deb_2205_1.nasl,
scripts/gb_hp_ux_HPSBUX01104.nasl,
scripts/gb_mandriva_MDVSA_2011_148.nasl,
scripts/sles10_cifs-mount.nasl,
scripts/deb_2173_1.nasl,
scripts/gb_mandriva_MDKSA_2007_097.nasl,
scripts/gb_ubuntu_USN_612_4.nasl,
scripts/sles11_xerces-j2.nasl,
scripts/gb_fedora_2007_3666_phpMyAdmin_fc7.nasl,
scripts/gb_fedora_2011_0120_Django_fc14.nasl,
scripts/secpod_hp_openview_nnm_mult_vuln_may10.nasl,
scripts/gb_ms_kernel_prv_esc_vuln.nasl,
scripts/wu_ftpd_rnfr_file_overwrite.nasl,
scripts/check_dns_tcp.nasl,
scripts/fcore_2009_11490.nasl,
scripts/secpod_atlassian_jira_detect.nasl,
scripts/gb_ms_windows_stuxnet_unspecified_vuln.nasl,
scripts/gb_fedora_2011_11084_mozvoikko_fc14.nasl,
scripts/gb_solaris_138827_06.nasl,
scripts/gb_mandriva_MDVSA_2008_234.nasl,
scripts/gb_CESA-2008_0908_thunderbird_centos4_x86_64.nasl,
scripts/freebsd_p5-DBI.nasl,
scripts/gb_fedora_2008_1629_kernel-xen-2.6_fc7.nasl,
scripts/deb_286_1.nasl,
scripts/gb_fedora_2011_8647_gnome-web-photo_fc14.nasl,
scripts/cups_multiple_vulnerabilities.nasl:
Updated script metadata (changes for CR56).



Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/ChangeLog	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,5 +1,309 @@
 2011-11-4  Henri Doreau <henri.doreau at greenbone.net>
 
+	* scripts/freebsdsa_openssl5.nasl,
+	scripts/gb_RHSA-2010_0002-01_PyXML.nasl,
+	scripts/nanocms_detect.nasl,
+	scripts/gb_fedora_2010_6096_oxygen-icon-theme_fc12.nasl,
+	scripts/glsa_200710_06.nasl,
+	scripts/Beerwins_PhpLinkAdmin_1_0.nasl,
+	scripts/gb_hp_ux_HPSBUX02306.nasl,
+	scripts/gb_fedora_2011_8021_fetchmail_fc14.nasl,
+	scripts/sles9p5020045.nasl,
+	scripts/gb_fedora_2010_14235_kernel_fc13.nasl,
+	scripts/sles9p5043440.nasl,
+	scripts/gb_fedora_2011_9132_phpMyAdmin_fc15.nasl,
+	scripts/sles9p5043892.nasl,
+	scripts/gb_fedora_2010_11428_maniadrive_fc12.nasl,
+	scripts/freebsd_firefox21.nasl,
+	scripts/mdksa_2009_158_2.nasl,
+	scripts/deb_1667_1.nasl,
+	scripts/firestats_35367.nasl,
+	scripts/gb_CESA-2010_0162_openssl_centos5_i386.nasl,
+	scripts/secpod_realplayer_swf_bof_vuln_900015.nasl,
+	scripts/gb_fedora_2010_8805_krb5_fc12.nasl,
+	scripts/freebsd_krb54.nasl,
+	scripts/gb_solaris_111647_01.nasl,
+	scripts/gb_CESA-2009_1671_kernel_centos4_i386.nasl,
+	scripts/deb_1361_1.nasl,
+	scripts/deb_2123_1.nasl,
+	scripts/gb_solaris_111882_03.nasl,
+	scripts/gb_fedora_2011_3827_libtiff_fc13.nasl,
+	scripts/gb_mandriva_MDVSA_2011_106.nasl,
+	scripts/gb_fedora_2008_6127_openvrml_fc8.nasl,
+	scripts/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl,
+	scripts/gb_fedora_2011_9891_dbus_fc15.nasl,
+	scripts/deb_1755_1.nasl,
+	scripts/ubuntu_771_1.nasl,
+	scripts/freebsd_irssi.nasl,
+	scripts/gb_fedora_2008_5454_kernel_fc8.nasl,
+	scripts/taifajobs_1_0_jobid_sql_injection.nasl,
+	scripts/freebsd_ethereal.nasl,
+	scripts/secpod_metaserver_rt_multiple_dos_vuln.nasl,
+	scripts/gb_fedora_2007_614_libexif_fc6.nasl,
+	scripts/sles9p5012976.nasl,
+	scripts/secpod_ibm_db2_repeat_bof_vuln_win.nasl,
+	scripts/basilix_message_content_script_injection.nasl,
+	scripts/openssh_afs.nasl,
+	scripts/gb_hp_ux_HPSBUX02408.nasl,
+	scripts/gb_CESA-2008_0977_seamonkey_centos4_i386.nasl,
+	scripts/secpod_sun_java_se_mult_vuln_nov09_win.nasl,
+	scripts/mdksa_2009_299.nasl,
+	scripts/glsa_200803_03.nasl,
+	scripts/gb_solaris_142676_02.nasl,
+	scripts/sles11_libapr-util1.nasl,
+	scripts/gb_firefox_keygen_dos_vuln_lin.nasl,
+	scripts/gb_adobe_flash_player_swf_proc_vuln.nasl,
+	scripts/secpod_ms10-038.nasl,
+	scripts/deb_144_1.nasl,
+	scripts/deb_1260_1.nasl,
+	scripts/gb_bugzilla_45982.nasl,
+	scripts/gb_f-prot_av_dos_vuln.nasl,
+	scripts/sles11_clamav1.nasl,
+	scripts/deb_312_1.nasl,
+	scripts/squid_rdos.nasl,
+	scripts/iis_dot_cnf.nasl,
+	scripts/gb_fedora_2010_15534_cgit_fc13.nasl,
+	scripts/ubuntu_787_1.nasl,
+	scripts/fcore_2009_1517.nasl,
+	scripts/freebsd_wireshark5.nasl,
+	scripts/upnp_xp.nasl,
+	scripts/mdksa_2009_098.nasl,
+	scripts/freebsd_jabberd1.nasl,
+	scripts/gb_mandriva_MDVSA_2010_252.nasl,
+	scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl,
+	scripts/RHSA_2009_0459.nasl,
+	scripts/subversion_1_0_6.nasl,
+	scripts/secpod_ms11-038.nasl,
+	scripts/gb_fedora_2010_14236_squid_fc12.nasl,
+	scripts/deb_080_1.nasl,
+	scripts/gb_mandriva_MDVSA_2011_036.nasl,
+	scripts/phpadsnew_xss.nasl,
+	scripts/deb_1713_1.nasl,
+	scripts/gb_mandriva_MDVA_2010_099.nasl,
+	scripts/hp_power_manager_mult_remote_code_execution.nasl,
+	scripts/secpod_mantis_mult_lfi_n_xss_vuln.nasl,
+	scripts/gb_CESA-2008_0240_xpdf_centos4_x86_64.nasl,
+	scripts/gb_RHSA-2011_1359-01_xorg-x11-server.nasl,
+	scripts/freebsd_cvs+ipv60.nasl,
+	scripts/eggdrop_24070.nasl,
+	scripts/gb_solaris_125332_06.nasl,
+	scripts/gb_fedora_2010_15070_gnome-web-photo_fc13.nasl,
+	scripts/freebsd_samba12.nasl,
+	scripts/gb_fedora_2007_2649_drupal_fc7.nasl,
+	scripts/gb_ocs_inventory_35593.nasl,
+	scripts/gb_mandriva_MDKA_2007_096.nasl,
+	scripts/RHSA_2009_0005.nasl,
+	scripts/gb_mozilla_prdts_mult_vuln_sep11_win02.nasl,
+	scripts/tftp_files_hp_ignite_ux.nasl,
+	scripts/gb_RHSA-2010_0679-01_rpm.nasl,
+	scripts/win_CVE-2008-0080.nasl,
+	scripts/glsa_200703_24.nasl,
+	scripts/sles9p5016198.nasl,
+	scripts/deb_524_1.nasl,
+	scripts/gb_solaris_109668_07.nasl,
+	scripts/gb_webid_48554.nasl,
+	scripts/gb_mandriva_MDKA_2007_124.nasl,
+	scripts/gb_fedora_2010_5545_libnids_fc11.nasl,
+	scripts/freebsd_acroread1.nasl,
+	scripts/ubuntu_796_1.nasl,
+	scripts/deb_593_1.nasl,
+	scripts/glsa_201006_02.nasl,
+	scripts/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl,
+	scripts/ilohamail_attachment_upload.nasl,
+	scripts/freebsdsa_zfs.nasl,
+	scripts/gb_prtg_network_monitor_detect.nasl,
+	scripts/freebsd_apr.nasl,
+	scripts/secpod_google_chrome_getsvgdocument_xss_vuln.nasl,
+	scripts/gb_fedora_2010_0964_gzip_fc11.nasl,
+	scripts/sles10_cups2.nasl,
+	scripts/secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl,
+	scripts/gb_firestats_41548.nasl,
+	scripts/gb_solaris_118918_24.nasl,
+	scripts/fcore_2009_10466.nasl,
+	scripts/mdksa_2009_263.nasl,
+	scripts/fcore_2009_0331.nasl,
+	scripts/deb_1704_2.nasl,
+	scripts/gb_CESA-2008_0584_pidgin_centos3_i386.nasl,
+	scripts/gb_CESA-2008_0946_ed_centos4_x86_64.nasl,
+	scripts/freebsdsa_jail2.nasl,
+	scripts/freebsd_jabberd0.nasl,
+	scripts/glsa_200510_23.nasl,
+	scripts/freebsd_bidwatcher.nasl,
+	scripts/glsa_200710_04.nasl,
+	scripts/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl,
+	scripts/gb_ubuntu_USN_511_2.nasl,
+	scripts/deb_1778_1.nasl,
+	scripts/gb_clamav_remote_dos_vuln.nasl,
+	scripts/gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl,
+	scripts/secpod_mikmod_dos_vuln.nasl,
+	scripts/sendcard_sql.nasl,
+	scripts/gb_fedora_2011_11087_thunderbird-lightning_fc15.nasl,
+	scripts/myserver_traversal.nasl,
+	scripts/gb_hp_power_manager_csrf_vuln.nasl,
+	scripts/gb_mandriva_MDKA_2007_048_1.nasl,
+	scripts/gb_family_connections_40043.nasl,
+	scripts/deb_021_1.nasl,
+	scripts/gb_solaris_114636_04.nasl,
+	scripts/fcore_2009_5509.nasl,
+	scripts/secpod_ms08-074.nasl,
+	scripts/gb_gizmo5_detect_lin.nasl,
+	scripts/fcore_2009_2417.nasl,
+	scripts/owa-anonymous.nasl,
+	scripts/gb_hp_ux_HPSBUX00148.nasl,
+	scripts/gb_mandriva_MDVA_2008_062.nasl,
+	scripts/glsa_200802_08.nasl,
+	scripts/gb_solaris_141415_10.nasl,
+	scripts/gb_fedora_2008_9791_htop_fc8.nasl,
+	scripts/gb_ms07-042.nasl,
+	scripts/freebsd_xtrlock.nasl,
+	scripts/gb_solaris_114984_02.nasl,
+	scripts/gb_cruxcms_xss_vuln.nasl,
+	scripts/ovcesa2009_1116.nasl,
+	scripts/gb_ccproxy_detect.nasl,
+	scripts/gb_fedora_2010_1720_systemtap_fc12.nasl,
+	scripts/gb_adobe_prdts_mult_vuln_feb10_lin.nasl,
+	scripts/freebsd_imwheel.nasl,
+	scripts/freebsd_drupal3.nasl,
+	scripts/gb_fedora_2010_10876_kernel_fc13.nasl,
+	scripts/deb_412_1.nasl,
+	scripts/freebsd_vlc4.nasl,
+	scripts/gb_RHSA-2008_0892-01_xen.nasl,
+	scripts/gb_mandriva_MDVA_2010_088.nasl,
+	scripts/deb_1380_1.nasl,
+	scripts/glsa_200511_12.nasl,
+	scripts/gb_pligg_cms_41729.nasl,
+	scripts/deb_1828_1.nasl,
+	scripts/gb_fedora_2010_19330_wordpress-mu_fc13.nasl,
+	scripts/sles9p5013049.nasl,
+	scripts/php_split_mime.nasl,
+	scripts/gb_fedora_2011_2743_clamav_fc14.nasl,
+	scripts/deb_1539_1.nasl,
+	scripts/gb_php_crypt_func_sec_bypass_vuln_win.nasl,
+	scripts/freebsd_linux-opera4.nasl,
+	scripts/gb_wow_activex_mult_remote_code_exec_vuln.nasl,
+	scripts/freebsd_firefox40.nasl,
+	scripts/gb_fedora_2010_10469_mingw32-libtiff_fc12.nasl,
+	scripts/deb_278_1.nasl,
+	scripts/ovcesa2009_0457.nasl,
+	scripts/deb_980_1.nasl,
+	scripts/gb_fedora_2010_4407_hamlib_fc12.nasl,
+	scripts/freebsd_firefox20.nasl,
+	scripts/secpod_wintftp_server_dir_trav_vuln.nasl,
+	scripts/gb_ubuntu_USN_876_1.nasl,
+	scripts/gb_google_chrome_mult_vuln_oct11_win.nasl,
+	scripts/deb_2091_1.nasl,
+	scripts/gb_ms_windows_media_player_bof_vuln.nasl,
+	scripts/RHSA_2009_1651.nasl,
+	scripts/gb_fedora_2007_4305_eggdrop_fc8.nasl,
+	scripts/ftpd_any_cmd.nasl,
+	scripts/sles9p5009300.nasl,
+	scripts/gb_fedora_2010_10361_gnome-python2-extras_fc13.nasl,
+	scripts/freebsd_mplayer9.nasl,
+	scripts/secpod_realvnc_remote_code_exe_vuln_win_900162.nasl,
+	scripts/mdksa_2009_290_1.nasl,
+	scripts/freebsd_trac2.nasl,
+	scripts/glsa_200510_12.nasl,
+	scripts/secpod_audacity_bof_vuln_win.nasl,
+	scripts/sles9p5020679.nasl,
+	scripts/mdksa_2009_197_2.nasl,
+	scripts/gb_CESA-2009_0430_xpdf_centos4_i386.nasl,
+	scripts/deb_2063_1.nasl,
+	scripts/gb_mandriva_MDVA_2011_000.nasl,
+	scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl,
+	scripts/gb_fedora_2011_11189_hplip_fc15.nasl,
+	scripts/gb_fedora_2008_2616_libsilc_fc7.nasl,
+	scripts/sles9p5012769.nasl,
+	scripts/gb_ubuntu_USN_475_1.nasl,
+	scripts/gb_RHSA-2010_0547-01_firefox.nasl,
+	scripts/gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl,
+	scripts/gb_google_chrome_mult_vuln_aug11_macosx.nasl,
+	scripts/mdksa_2009_032.nasl,
+	scripts/secpod_strongswan_n_openswan_dos_vuln_jun09.nasl,
+	scripts/gb_solaris_119903_02.nasl,
+	scripts/centreon_37383.nasl,
+	scripts/gb_interchange_web_detect.nasl,
+	scripts/freebsd_pivot-weblog.nasl,
+	scripts/gb_ubuntu_USN_890_1.nasl,
+	scripts/deb_1968_2.nasl,
+	scripts/secpod_oracle_http_server_xss_header_injection_vuln.nasl,
+	scripts/deb_419_1.nasl,
+	scripts/deb_013_1.nasl,
+	scripts/gb_solaris_114432_34.nasl,
+	scripts/sles11_libvolume_id1.nasl,
+	scripts/freebsd_png3.nasl,
+	scripts/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl,
+	scripts/Cryptographp_local_file_include.nasl,
+	scripts/secpod_novell_iprint_client_mult_bof_vuln_win.nasl,
+	scripts/novell_groupwise_webacc_information_disclosure.nasl,
+	scripts/gb_ubuntu_USN_579_1.nasl,
+	scripts/gb_fedora_2010_18890_seamonkey_fc13.nasl,
+	scripts/ubuntu_811_1.nasl,
+	scripts/gb_fedora_2010_9320_xinha_fc13.nasl,
+	scripts/gb_fedora_2010_10083_dhcp_fc11.nasl,
+	scripts/freebsd_libvorbis1.nasl,
+	scripts/glsa_200612_02.nasl,
+	scripts/fcore_2009_12782.nasl,
+	scripts/deb_145_1.nasl,
+	scripts/jolt2.nasl,
+	scripts/gb_seamonkey_mult_vuln_mar09_lin.nasl,
+	scripts/gb_serva32_web_server_dos_vuln.nasl,
+	scripts/gb_solaris_114265_19.nasl,
+	scripts/deb_1958_1.nasl,
+	scripts/gb_fedora_2010_14411_phpMyAdmin_fc12.nasl,
+	scripts/DDI_PIX_Firewall_Manager.nasl,
+	scripts/suse_sr_2009_009.nasl,
+	scripts/secpod_squirrelmail_cmd_exec_vuln.nasl,
+	scripts/freebsdsa_nd6.nasl,
+	scripts/freebsd_rssh.nasl,
+	scripts/gb_mandriva_MDVSA_2008_032.nasl,
+	scripts/gb_fedora_2011_9311_squirrelmail_fc15.nasl,
+	scripts/gb_ubuntu_USN_428_1.nasl,
+	scripts/freebsd_freetype20.nasl,
+	scripts/ssh_proto_version.nasl,
+	scripts/gb_php_imap_do_open_dos_vuln.nasl,
+	scripts/freebsd_f2c.nasl,
+	scripts/gb_RHSA-2008_0240-01_xpdf.nasl,
+	scripts/gb_CESA-2008_0288_samba_centos3_i386.nasl,
+	scripts/gb_php_31612.nasl,
+	scripts/gb_fedora_2010_12269_roundup_fc12.nasl,
+	scripts/gb_fedora_2008_1728_scponly_fc7.nasl,
+	scripts/secpod_firefox_dos_vuln_sep09_lin.nasl,
+	scripts/glsa_200503_07.nasl,
+	scripts/gb_CESA-2011_1089_systemtap_centos5_i386.nasl,
+	scripts/gb_solaris_110916_07.nasl,
+	scripts/gb_fedora_2007_100_ed_fc6.nasl,
+	scripts/gb_CESA-2007_1049_kernel_centos3_i386.nasl,
+	scripts/scripteen_multiple.nasl,
+	scripts/deb_2205_1.nasl,
+	scripts/gb_hp_ux_HPSBUX01104.nasl,
+	scripts/gb_mandriva_MDVSA_2011_148.nasl,
+	scripts/sles10_cifs-mount.nasl,
+	scripts/deb_2173_1.nasl,
+	scripts/gb_mandriva_MDKSA_2007_097.nasl,
+	scripts/gb_ubuntu_USN_612_4.nasl,
+	scripts/sles11_xerces-j2.nasl,
+	scripts/gb_fedora_2007_3666_phpMyAdmin_fc7.nasl,
+	scripts/gb_fedora_2011_0120_Django_fc14.nasl,
+	scripts/secpod_hp_openview_nnm_mult_vuln_may10.nasl,
+	scripts/gb_ms_kernel_prv_esc_vuln.nasl,
+	scripts/wu_ftpd_rnfr_file_overwrite.nasl,
+	scripts/check_dns_tcp.nasl,
+	scripts/fcore_2009_11490.nasl,
+	scripts/secpod_atlassian_jira_detect.nasl,
+	scripts/gb_ms_windows_stuxnet_unspecified_vuln.nasl,
+	scripts/gb_fedora_2011_11084_mozvoikko_fc14.nasl,
+	scripts/gb_solaris_138827_06.nasl,
+	scripts/gb_mandriva_MDVSA_2008_234.nasl,
+	scripts/gb_CESA-2008_0908_thunderbird_centos4_x86_64.nasl,
+	scripts/freebsd_p5-DBI.nasl,
+	scripts/gb_fedora_2008_1629_kernel-xen-2.6_fc7.nasl,
+	scripts/deb_286_1.nasl,
+	scripts/gb_fedora_2011_8647_gnome-web-photo_fc14.nasl,
+	scripts/cups_multiple_vulnerabilities.nasl:
+	Updated script metadata (changes for CR56).
+
+2011-11-4  Henri Doreau <henri.doreau at greenbone.net>
+
 	* scripts/deb_1898_1.nasl,
 	scripts/gb_ms08-030.nasl,
 	scripts/mdksa_2009_186.nasl,

Modified: trunk/openvas-plugins/scripts/Beerwins_PhpLinkAdmin_1_0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/Beerwins_PhpLinkAdmin_1_0.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/Beerwins_PhpLinkAdmin_1_0.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(100058);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-18 10:43:43 +0100 (Wed, 18 Mar 2009)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2009-1024");
  script_bugtraq_id(34129);
@@ -51,10 +53,8 @@
   affected.
 
  See also:
-  http://www.securityfocus.com/bid/34129
+  http://www.securityfocus.com/bid/34129";
 
- Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if Beerwin's PhpLinkAdmin is vulnerable to SQL Injection and Remote File Include");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/Cryptographp_local_file_include.nasl
===================================================================
--- trunk/openvas-plugins/scripts/Cryptographp_local_file_include.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/Cryptographp_local_file_include.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,6 +28,8 @@
 {
  script_id(100060);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-17 15:36:47 +0100 (Tue, 17 Mar 2009)");
  script_bugtraq_id(34122);
  script_tag(name:"risk_factor", value:"Medium");
 
@@ -45,10 +47,8 @@
   Cryptographp 1.4 is vulnerable; other versions may also be affected. 
 
  See also:
-  http://www.securityfocus.com/bid/34122
+  http://www.securityfocus.com/bid/34122";
 
- Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if Cryptographp is vulnerable to Local File Include");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl
===================================================================
--- trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/DDI_PIX_Firewall_Manager.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(10819);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(691);
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0005.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0005.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63110);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-07 23:16:01 +0100 (Wed, 07 Jan 2009)");
  script_cve_id("CVE-2005-0706");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -58,10 +60,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-0005.html
-http://www.redhat.com/security/updates/classification/#moderate
+http://www.redhat.com/security/updates/classification/#moderate";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:0005";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63911);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-05 16:00:35 +0200 (Tue, 05 May 2009)");
  script_cve_id("CVE-2008-4307", "CVE-2009-0028", "CVE-2009-0676", "CVE-2009-0834");
  script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -76,10 +78,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-0459.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:0459";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1651.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1651.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1651.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(66473);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-14 23:06:43 +0100 (Mon, 14 Dec 2009)");
  script_cve_id("CVE-2009-0159", "CVE-2009-3563");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -64,10 +66,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1651.html
-http://www.redhat.com/security/updates/classification/#moderate
+http://www.redhat.com/security/updates/classification/#moderate";
 
-Risk factor: High";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1651");

Modified: trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/basilix_message_content_script_injection.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -25,6 +25,8 @@
 if (description) {
   script_id(14218);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
 

Modified: trunk/openvas-plugins/scripts/centreon_37383.nasl
===================================================================
--- trunk/openvas-plugins/scripts/centreon_37383.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/centreon_37383.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,6 +28,8 @@
 {
  script_id(100428);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-06 10:44:19 +0100 (Wed, 06 Jan 2010)");
  script_tag(name:"cvss_base", value:"10.0");
  script_cve_id("CVE-2009-4368");
  script_bugtraq_id(37383);
@@ -50,10 +52,8 @@
 References:
 http://www.securityfocus.com/bid/37383
 http://www.centreon.com/Development/changelog-2x.html
-http://www.centreon.com/
+http://www.centreon.com/";
 
-Risk factor: Critical";
-
  script_description(desc);
  script_summary("Determine if Centreon is prone to a security-bypass vulnerability");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/check_dns_tcp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/check_dns_tcp.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/check_dns_tcp.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(18356);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  
  script_tag(name:"risk_factor", value:"Low");
  name = "DNS Server on UDP and TCP";
@@ -41,11 +43,9 @@
 
 This configuration is incorrect: TCP might be used by any 
 request, it is not restricted to zone transfers.
-Read RFC1035 or STD0013 for more information.
+Read RFC1035 or STD0013 for more information.";
 
-Risk factor : Low";
 
-
  script_description(desc);
  
  summary = "Checks if the remote DNS servers answers on TCP too";

Modified: trunk/openvas-plugins/scripts/cups_multiple_vulnerabilities.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cups_multiple_vulnerabilities.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/cups_multiple_vulnerabilities.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -25,6 +25,8 @@
 if (description) {
   script_id(16141);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"cvss_base", value:"6.5");
   script_tag(name:"risk_factor", value:"High");
 
@@ -80,8 +82,7 @@
            http://www.cups.org/str.php?L1024
            http://www.cups.org/str.php?L1023
            http://www.cups.org/str.php?L1042
-Solution : Upgrade to CUPS 1.1.23 or later.
-Risk factor : High";
+Solution : Upgrade to CUPS 1.1.23 or later.";
   script_description(desc);
 
   summary = "Checks version of CUPS";

Modified: trunk/openvas-plugins/scripts/deb_013_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_013_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_013_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53776);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 013-1 (mysql)";
  script_name(name);
@@ -41,10 +43,8 @@
 We recommend you upgrade your mysql package immediately.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20013-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20013-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 013-1 (mysql)";

Modified: trunk/openvas-plugins/scripts/deb_021_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_021_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_021_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53784);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 021-1 (apache)";
  script_name(name);
@@ -44,10 +46,8 @@
 We recommend you upgrade your Apache packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20021-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20021-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 021-1 (apache)";

Modified: trunk/openvas-plugins/scripts/deb_080_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_080_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_080_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53571);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 080-1 (htdig)";
  script_name(name);
@@ -53,10 +55,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20080-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20080-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 080-1 (htdig)";

Modified: trunk/openvas-plugins/scripts/deb_1260_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1260_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1260_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(58015);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:17:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-0770", "CVE-2006-5456");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your imagemagick packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201260-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201260-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1260-1 (imagemagick)";

Modified: trunk/openvas-plugins/scripts/deb_1361_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1361_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1361_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(58580);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-3791");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your postfix-policyd package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201361-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201361-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1361-1 (postfix-policyd)";

Modified: trunk/openvas-plugins/scripts/deb_1380_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1380_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1380_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(58640);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-5034");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -49,10 +51,8 @@
 We recommend that you upgrade your elinks package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201380-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201380-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1380-1 (elinks)";

Modified: trunk/openvas-plugins/scripts/deb_144_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_144_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_144_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53580);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(5260);
  script_cve_id("CVE-2002-0818");
  script_tag(name:"cvss_base", value:"7.5");
@@ -58,10 +60,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20144-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20144-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 144-1 (wwwoffle)";

Modified: trunk/openvas-plugins/scripts/deb_145_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_145_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_145_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53726);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2002-0847");
  script_bugtraq_id(4731);
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20145-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20145-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 145-1 (tinyproxy)";

Modified: trunk/openvas-plugins/scripts/deb_1539_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1539_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1539_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,6 +28,8 @@
 {
  script_id(60784);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-04-21 20:40:14 +0200 (Mon, 21 Apr 2008)");
  script_cve_id("CVE-2007-4542", "CVE-2007-4629");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -64,10 +66,8 @@
 We recommend that you upgrade your mapserver (4.10.0-5.1+etch2) package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201539-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201539-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1539-1 (mapserver)";

Modified: trunk/openvas-plugins/scripts/deb_1667_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1667_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1667_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,6 +28,8 @@
 {
  script_id(61905);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-11-24 23:46:43 +0100 (Mon, 24 Nov 2008)");
  script_cve_id("CVE-2008-2315", "CVE-2008-3142", "CVE-2008-3143", "CVE-2008-3144");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -72,10 +74,8 @@
 We recommend that you upgrade your python2.4 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201667-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201667-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1667-1 (python2.4)";

Modified: trunk/openvas-plugins/scripts/deb_1704_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1704_2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1704_2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63302);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-02 23:28:24 +0100 (Mon, 02 Feb 2009)");
  script_cve_id("CVE-2008-5718");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -58,10 +60,8 @@
 We recommend that you upgrade your netatalk package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201704-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201704-2";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1704-2 (netatalk)";

Modified: trunk/openvas-plugins/scripts/deb_1713_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1713_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1713_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63299);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-02 23:28:24 +0100 (Mon, 02 Feb 2009)");
  script_cve_id("CVE-2009-0282");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -56,10 +58,8 @@
 We recommend that you upgrade your rt2500 package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201713-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201713-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1713-1 (rt2500)";

Modified: trunk/openvas-plugins/scripts/deb_1755_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1755_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1755_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63685);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-31 19:20:21 +0200 (Tue, 31 Mar 2009)");
  script_cve_id("CVE-2009-0784");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your systemtap package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201755-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201755-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1755-1 (systemtap)";

Modified: trunk/openvas-plugins/scripts/deb_1778_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1778_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1778_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63888);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-28 20:40:12 +0200 (Tue, 28 Apr 2009)");
  script_cve_id("CVE-2009-0664");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -57,10 +59,8 @@
 We recommend that you upgrade your mahara packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201778-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201778-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1778-1 (mahara)";

Modified: trunk/openvas-plugins/scripts/deb_1828_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1828_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1828_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(64380);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-15 04:21:35 +0200 (Wed, 15 Jul 2009)");
  script_cve_id("CVE-2009-0667");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
@@ -63,10 +65,8 @@
 We recommend that you upgrade your ocsinventory-agent packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201828-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201828-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1828-1 (ocsinventory-agent)";

Modified: trunk/openvas-plugins/scripts/deb_1958_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1958_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1958_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(66599);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)");
  script_cve_id("CVE-2009-3736");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
@@ -56,10 +58,8 @@
 We recommend that you upgrade your libtool packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201958-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201958-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1958-1 (libtool)");

Modified: trunk/openvas-plugins/scripts/deb_1968_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1968_2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_1968_2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(66776);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-02-01 18:25:19 +0100 (Mon, 01 Feb 2010)");
  script_cve_id("CVE-2009-4010", "CVE-2009-4009");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -56,10 +58,8 @@
 We recommend that you upgrade your pdns-recursor package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201968-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201968-2";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1968-2 (pdns-recursor)");

Modified: trunk/openvas-plugins/scripts/deb_2063_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2063_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_2063_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(67635);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-06 02:35:12 +0200 (Tue, 06 Jul 2010)");
  script_tag(name:"cvss_base", value:"1.9");
  script_cve_id("CVE-2010-2192");
  script_tag(name:"risk_factor", value:"Low");
@@ -54,10 +56,8 @@
 We recommend that you upgrade your pmount package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202063-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202063-1";
 
-Risk factor : Low";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2063-1 (pmount)");

Modified: trunk/openvas-plugins/scripts/deb_2091_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2091_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_2091_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(67845);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-08-21 08:54:16 +0200 (Sat, 21 Aug 2010)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2009-2964", "CVE-2010-2813");
  script_tag(name:"risk_factor", value:"High");
@@ -56,10 +58,8 @@
 We recommend that you upgrade your squirrelmail packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202091-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202091-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2091-1 (squirrelmail)");

Modified: trunk/openvas-plugins/scripts/deb_2123_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2123_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_2123_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(68457);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-11-17 03:33:48 +0100 (Wed, 17 Nov 2010)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2010-3170", "CVE-2010-3173");
  script_tag(name:"risk_factor", value:"High");
@@ -64,10 +66,8 @@
 We recommend that you upgrade your NSS packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202123-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202123-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2123-1 (nss)");

Modified: trunk/openvas-plugins/scripts/deb_2173_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2173_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_2173_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(69107);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Debian Security Advisory DSA 2173-1 (pam-pgsql)");
 
@@ -51,10 +53,8 @@
 
 We recommend that you upgrade your pam-pgsql packages.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202173-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202173-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2173-1 (pam-pgsql)");

Modified: trunk/openvas-plugins/scripts/deb_2205_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2205_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_2205_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(69415);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)");
  script_tag(name:"cvss_base", value:"6.9");
  script_cve_id("CVE-2011-0727");
  script_tag(name:"risk_factor", value:"High");
@@ -54,10 +56,8 @@
 We recommend that you upgrade your gdm3 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202205-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202205-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2205-1 (gdm3)");

Modified: trunk/openvas-plugins/scripts/deb_278_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_278_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_278_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53346);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-0161");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -54,10 +56,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20278-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20278-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 278-1 (sendmail)";

Modified: trunk/openvas-plugins/scripts/deb_286_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_286_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_286_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53355);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 286-1 (gs-common)";
  script_name(name);
@@ -53,10 +55,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20286-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20286-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 286-1 (gs-common)";

Modified: trunk/openvas-plugins/scripts/deb_312_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_312_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_312_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53601);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:36:24 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2002-0429", "CVE-2003-0001", "CVE-2003-0127", "CVE-2003-0244", "CVE-2003-0246", "CVE-2003-0247", "CVE-2003-0248", "CVE-2003-0364");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -91,10 +93,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20312-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20312-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 312-1 (kernel-patch-2.4.18-powerpc)";

Modified: trunk/openvas-plugins/scripts/deb_412_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_412_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_412_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53109);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(9365);
  script_cve_id("CVE-2004-0014");
  script_tag(name:"cvss_base", value:"7.5");
@@ -55,10 +57,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20412-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20412-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 412-1 (nd)";

Modified: trunk/openvas-plugins/scripts/deb_419_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_419_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_419_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53119);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0016", "CVE-2004-0017");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -67,10 +69,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20419-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20419-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 419-1 (phpgroupware)";

Modified: trunk/openvas-plugins/scripts/deb_524_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_524_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_524_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53689);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0393", "CVE-2004-0454");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -59,10 +61,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20524-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20524-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 524-1 (rlpr)";

Modified: trunk/openvas-plugins/scripts/deb_593_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_593_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_593_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(53281);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(11548);
  script_cve_id("CVE-2004-0981");
  script_tag(name:"cvss_base", value:"10.0");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20593-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20593-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 593-1 (imagemagick)";

Modified: trunk/openvas-plugins/scripts/deb_980_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_980_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/deb_980_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
  script_id(56320);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-2161", "CVE-2004-2162");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -61,10 +63,8 @@
 We recommend that you upgrade your tutos package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20980-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20980-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 980-1 (tutos)";

Modified: trunk/openvas-plugins/scripts/eggdrop_24070.nasl
===================================================================
--- trunk/openvas-plugins/scripts/eggdrop_24070.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/eggdrop_24070.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(100228);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-08 19:01:22 +0200 (Wed, 08 Jul 2009)");
  script_bugtraq_id(24070);
  script_cve_id("CVE-2007-2807");
  script_tag(name:"cvss_base", value:"6.8");
@@ -55,10 +57,8 @@
 
  Solution:
   The vendor has released an update. Please see
-  http://www.eggheads.org/ for more information.
+  http://www.eggheads.org/ for more information.";
 
- Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if Eggdrop Version < 1.6.18");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/fcore_2009_0331.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_0331.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/fcore_2009_0331.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63142);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-13 22:38:32 +0100 (Tue, 13 Jan 2009)");
  script_cve_id("CVE-2008-5077");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0331
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0331";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-0331 (openssl)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_10466.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10466.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/fcore_2009_10466.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(66041);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)");
  script_cve_id("CVE-2009-3648");
  script_tag(name:"cvss_base", value:"3.5");
  script_tag(name:"risk_factor", value:"Medium");
@@ -54,10 +56,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10466
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10466";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-10466 (drupal-service_links)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_11490.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_11490.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/fcore_2009_11490.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(66266);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)");
  script_cve_id("CVE-2009-2409", "CVE-2009-3873", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3874", "CVE-2009-3728", "CVE-2009-3881", "CVE-2009-3882", "CVE-2009-3883", "CVE-2009-3880", "CVE-2009-3879", "CVE-2009-3884");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -47,10 +49,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11490
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-11490";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-11490 (java-1.6.0-openjdk)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_12782.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12782.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/fcore_2009_12782.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(66451);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2009-2629", "CVE-2009-3555", "CVE-2009-3896");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -56,10 +58,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12782
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12782";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-12782 (nginx)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_1517.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1517.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/fcore_2009_1517.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63384);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-13 20:43:17 +0100 (Fri, 13 Feb 2009)");
  script_cve_id("CVE-2004-0918", "CVE-2009-0478");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -61,10 +63,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1517
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1517";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-1517 (squid)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_2417.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_2417.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/fcore_2009_2417.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(63602);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)");
  script_cve_id("CVE-2008-4437", "CVE-2008-6098", "CVE-2009-0481", "CVE-2009-0483", "CVE-2009-0484", "CVE-2009-0485", "CVE-2009-0486", "CVE-2009-0482");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -85,10 +87,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2417
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2417";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-2417 (bugzilla)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_5509.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5509.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/fcore_2009_5509.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(64090);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2009-1523", "CVE-2009-1524");
  script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"risk_factor", value:"High");
@@ -64,10 +66,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5509
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5509";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 11 FEDORA-2009-5509 (jetty)";

Modified: trunk/openvas-plugins/scripts/firestats_35367.nasl
===================================================================
--- trunk/openvas-plugins/scripts/firestats_35367.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/firestats_35367.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(100227);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-21 16:51:00 +0200 (Sun, 21 Jun 2009)");
  script_bugtraq_id(35367);
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -51,10 +53,8 @@
   http://firestats.cc/ for more information.
 
  See also:
-  http://www.securityfocus.com/bid/35367
+  http://www.securityfocus.com/bid/35367";
 
- Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if FireStats version < 1.6.2");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/freebsd_acroread1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_acroread1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_acroread1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(55088);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(14603);
  script_cve_id("CVE-2005-2470");
  script_tag(name:"cvss_base", value:"7.5");
@@ -50,10 +52,8 @@
 software upgrades.
 
 http://www.adobe.com/support/techdocs/321644.html
-http://www.vuxml.org/freebsd/f74dc01b-0e83-11da-bc08-0001020eed82.html
+http://www.vuxml.org/freebsd/f74dc01b-0e83-11da-bc08-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: acroread";

Modified: trunk/openvas-plugins/scripts/freebsd_apr.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apr.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_apr.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(64191);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-09 19:38:29 +0200 (Tue, 09 Jun 2009)");
  script_cve_id("CVE-2009-1955", "CVE-2009-1956", "CVE-2009-0023");
  script_bugtraq_id(35221);
  script_tag(name:"cvss_base", value:"7.8");
@@ -74,10 +76,8 @@
 http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3
 http://secunia.com/advisories/35284/
 https://bugzilla.redhat.com/show_bug.cgi?id=3D504390
-http://www.vuxml.org/freebsd/eb9212f7-526b-11de-bbf2-001b77d09812.html
+http://www.vuxml.org/freebsd/eb9212f7-526b-11de-bbf2-001b77d09812.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: apr";

Modified: trunk/openvas-plugins/scripts/freebsd_bidwatcher.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bidwatcher.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_bidwatcher.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(52181);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0158");
  script_bugtraq_id(12590);
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://www.debian.org/security/2005/dsa-687
-http://www.vuxml.org/freebsd/74c86a29-81ef-11d9-a9e7-0001020eed82.html
+http://www.vuxml.org/freebsd/74c86a29-81ef-11d9-a9e7-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: bidwatcher";

Modified: trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_cvs+ipv60.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(52469);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0180", "CVE-2004-0405");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -56,10 +58,8 @@
 software upgrades.
 
 http://ccvs.cvshome.org/servlets/NewsItemView?newsID=102
-http://www.vuxml.org/freebsd/0792e7a7-8e37-11d8-90d1-0020ed76ef5a.html
+http://www.vuxml.org/freebsd/0792e7a7-8e37-11d8-90d1-0020ed76ef5a.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: cvs+ipv6";

Modified: trunk/openvas-plugins/scripts/freebsd_drupal3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_drupal3.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_drupal3.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(57104);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-2833");
  script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://drupal.org/node/66767
-http://www.vuxml.org/freebsd/6da7344b-128a-11db-b25f-00e00c69a70d.html
+http://www.vuxml.org/freebsd/6da7344b-128a-11db-b25f-00e00c69a70d.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: drupal";

Modified: trunk/openvas-plugins/scripts/freebsd_ethereal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ethereal.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_ethereal.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(52156);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0699", "CVE-2005-0704", "CVE-2005-0705", "CVE-2005-0739");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -72,10 +74,8 @@
 software upgrades.
 
 http://www.ethereal.com/appnotes/enpa-sa-00018.html
-http://www.vuxml.org/freebsd/cb470368-94d2-11d9-a9e0-0001020eed82.html
+http://www.vuxml.org/freebsd/cb470368-94d2-11d9-a9e0-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: ethereal, ethereal-lite, tethereal, tethereal-lite";

Modified: trunk/openvas-plugins/scripts/freebsd_f2c.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_f2c.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_f2c.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(56509);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0017", "CVE-2005-0018");
  script_bugtraq_id(1280);
  script_tag(name:"cvss_base", value:"2.1");
@@ -51,11 +53,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: f2c";

Modified: trunk/openvas-plugins/scripts/freebsd_firefox20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox20.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_firefox20.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(55391);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(15495, 14888);
  script_cve_id("CVE-2005-2968");
  script_tag(name:"cvss_base", value:"7.5");
@@ -78,10 +80,8 @@
 
 https://bugzilla.mozilla.org/show_bug.cgi?id=307185
 http://secunia.com/advisories/16869/
-http://www.vuxml.org/freebsd/2e28cefb-2aee-11da-a263-0001020eed82.html
+http://www.vuxml.org/freebsd/2e28cefb-2aee-11da-a263-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: firefox";

Modified: trunk/openvas-plugins/scripts/freebsd_firefox21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox21.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_firefox21.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(55419);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-2701", "CVE-2005-2702", "CVE-2005-2703", "CVE-2005-2704", "CVE-2005-2705", "CVE-2005-2706", "CVE-2005-2707");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -76,10 +78,8 @@
 software upgrades.
 
 http://www.mozilla.org/security/announce/mfsa2005-58.html
-http://www.vuxml.org/freebsd/8f5dd74b-2c61-11da-a263-0001020eed82.html
+http://www.vuxml.org/freebsd/8f5dd74b-2c61-11da-a263-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: firefox";

Modified: trunk/openvas-plugins/scripts/freebsd_firefox40.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox40.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_firefox40.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(64577);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2404", "CVE-2009-2408", "CVE-2009-2454", "CVE-2009-2470");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -79,10 +81,8 @@
 http://www.mozilla.org/security/announce/2009/mfsa2009-44.html
 http://www.mozilla.org/security/announce/2009/mfsa2009-45.html
 http://www.mozilla.org/security/announce/2009/mfsa2009-46.html
-http://www.vuxml.org/freebsd/49e8f2ee-8147-11de-a994-0030843d3802.html
+http://www.vuxml.org/freebsd/49e8f2ee-8147-11de-a994-0030843d3802.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: firefox, linux-firefox-devel");

Modified: trunk/openvas-plugins/scripts/freebsd_freetype20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_freetype20.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_freetype20.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(58851);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-2754");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -49,10 +51,8 @@
 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2754
 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
 http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
-http://www.vuxml.org/freebsd/de2fab2d-0a37-11dc-aae2-00304881ac9a.html
+http://www.vuxml.org/freebsd/de2fab2d-0a37-11dc-aae2-00304881ac9a.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: freetype2";

Modified: trunk/openvas-plugins/scripts/freebsd_imwheel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_imwheel.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_imwheel.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(52336);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"cvss_base", value:"6.9");
  script_cve_id("CVE-2004-2698");
  script_bugtraq_id(11008);
@@ -47,10 +49,8 @@
 
 http://www.caughq.org/advisories/CAU-2004-0002.txt
 http://imwheel.sourceforge.net/files/DEVELOPMENT.txt
-http://www.vuxml.org/freebsd/e31d44a2-21e3-11d9-9289-000c41e2cdad.html
+http://www.vuxml.org/freebsd/e31d44a2-21e3-11d9-9289-000c41e2cdad.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: imwheel";

Modified: trunk/openvas-plugins/scripts/freebsd_irssi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_irssi.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_irssi.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(67289);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-04-21 03:31:17 +0200 (Wed, 21 Apr 2010)");
  script_cve_id("CVE-2010-1155", "CVE-2010-1156");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -62,10 +64,8 @@
 
 http://xforce.iss.net/xforce/xfdb/57790
 http://xforce.iss.net/xforce/xfdb/57791
-http://www.vuxml.org/freebsd/3b7967f1-49e8-11df-83fb-0015587e2cc1.html
+http://www.vuxml.org/freebsd/3b7967f1-49e8-11df-83fb-0015587e2cc1.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: irssi");

Modified: trunk/openvas-plugins/scripts/freebsd_jabberd0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_jabberd0.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_jabberd0.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(54469);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: jabberd";
  script_name(name);
@@ -43,10 +45,8 @@
 software upgrades.
 
 http://j2.openaether.org/bugzilla/show_bug.cgi?id=99
-http://www.vuxml.org/freebsd/55041d37-ff62-11d9-a9a5-000ae4641456.html
+http://www.vuxml.org/freebsd/55041d37-ff62-11d9-a9a5-000ae4641456.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: jabberd";

Modified: trunk/openvas-plugins/scripts/freebsd_jabberd1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_jabberd1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_jabberd1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(56648);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(17155);
  script_cve_id("CVE-2006-1329");
  script_tag(name:"cvss_base", value:"5.0");
@@ -53,10 +55,8 @@
 http://article.gmane.org/gmane.network.jabber.admin/27372
 http://jabberstudio.org/projects/jabberd2/releases/view.php?id=826
 http://secunia.com/advisories/19281/
-http://www.vuxml.org/freebsd/f4af098d-d921-11da-ad4a-00123ffe8333.html
+http://www.vuxml.org/freebsd/f4af098d-d921-11da-ad4a-00123ffe8333.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: jabberd";

Modified: trunk/openvas-plugins/scripts/freebsd_krb54.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_krb54.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_krb54.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(67357);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-04 05:52:15 +0200 (Tue, 04 May 2010)");
  script_cve_id("CVE-2010-1320");
  script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt
-http://www.vuxml.org/freebsd/86b8b655-4d1a-11df-83fb-0015587e2cc1.html
+http://www.vuxml.org/freebsd/86b8b655-4d1a-11df-83fb-0015587e2cc1.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: krb5");

Modified: trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_libvorbis1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(66340);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-03 22:10:42 +0100 (Thu, 03 Dec 2009)");
  script_cve_id("CVE-2008-1420", "CVE-2009-3379");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -54,11 +56,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: libvorbis");

Modified: trunk/openvas-plugins/scripts/freebsd_linux-opera4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-opera4.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_linux-opera4.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(54467);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: linux-opera, opera-devel, opera";
  script_name(name);
@@ -47,10 +49,8 @@
 
 http://secunia.com/advisories/15870/
 http://www.opera.com/freebsd/changelogs/802/
-http://www.vuxml.org/freebsd/a2aa24fd-00d4-11da-bc08-0001020eed82.html
+http://www.vuxml.org/freebsd/a2aa24fd-00d4-11da-bc08-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: linux-opera, opera-devel, opera";

Modified: trunk/openvas-plugins/scripts/freebsd_mplayer9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mplayer9.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_mplayer9.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(61700);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-10-03 23:16:57 +0200 (Fri, 03 Oct 2008)");
  script_cve_id("CVE-2008-3827");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -58,10 +60,8 @@
 software upgrades.
 
 http://www.ocert.org/advisories/ocert-2008-013.html
-http://www.vuxml.org/freebsd/724e6f93-8f2a-11dd-821f-001cc0377035.html
+http://www.vuxml.org/freebsd/724e6f93-8f2a-11dd-821f-001cc0377035.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "mplayer -- multiple integer overflows";

Modified: trunk/openvas-plugins/scripts/freebsd_p5-DBI.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_p5-DBI.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_p5-DBI.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(56656);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0077");
  script_bugtraq_id(12360);
  script_tag(name:"cvss_base", value:"2.1");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://www.debian.org/security/2005/dsa-658
-http://www.vuxml.org/freebsd/8cfb6f42-d2b0-11da-a672-000e0c2e438a.html
+http://www.vuxml.org/freebsd/8cfb6f42-d2b0-11da-a672-000e0c2e438a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: p5-DBI, p5-DBI-137";

Modified: trunk/openvas-plugins/scripts/freebsd_pivot-weblog.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pivot-weblog.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_pivot-weblog.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(63700);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-31 19:20:21 +0200 (Tue, 31 Mar 2009)");
  script_bugtraq_id(34160);
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: pivot-weblog";
@@ -45,10 +47,8 @@
 software upgrades.
 
 http://secunia.com/advisories/34302/
-http://www.vuxml.org/freebsd/0fe73a4a-1b18-11de-8226-0030843d3802.html
+http://www.vuxml.org/freebsd/0fe73a4a-1b18-11de-8226-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: pivot-weblog";

Modified: trunk/openvas-plugins/scripts/freebsd_png3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_png3.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_png3.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(67361);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-04 05:52:15 +0200 (Tue, 04 May 2010)");
  script_cve_id("CVE-2010-0205");
  script_bugtraq_id(38478);
  script_tag(name:"cvss_base", value:"7.8");
@@ -58,10 +60,8 @@
 http://libpng.sourceforge.net/ADVISORY-1.4.1.html
 http://secunia.com/advisories/38774
 http://xforce.iss.net/xforce/xfdb/56661
-http://www.vuxml.org/freebsd/4fb5d2cd-4c77-11df-83fb-0015587e2cc1.html
+http://www.vuxml.org/freebsd/4fb5d2cd-4c77-11df-83fb-0015587e2cc1.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: png");

Modified: trunk/openvas-plugins/scripts/freebsd_rssh.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_rssh.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_rssh.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(52284);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(11791,11792);
  script_cve_id("CVE-2004-1161", "CVE-2004-1162");
  script_tag(name:"cvss_base", value:"7.5");
@@ -62,10 +64,8 @@
 software upgrades.
 
 http://marc.theaimsgroup.com/?l=bugtraq&m=110202047507273
-http://www.vuxml.org/freebsd/f11b219a-44b6-11d9-ae2f-021106004fd6.html
+http://www.vuxml.org/freebsd/f11b219a-44b6-11d9-ae2f-021106004fd6.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: rssh";

Modified: trunk/openvas-plugins/scripts/freebsd_samba12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_samba12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_samba12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(58855);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-2444", "CVE-2007-2446", "CVE-2007-2447");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -51,10 +53,8 @@
 http://de5.samba.org/samba/security/CVE-2007-2444.html
 http://de5.samba.org/samba/security/CVE-2007-2446.html
 http://de5.samba.org/samba/security/CVE-2007-2447.html
-http://www.vuxml.org/freebsd/3546a833-03ea-11dc-a51d-0019b95d4f14.html
+http://www.vuxml.org/freebsd/3546a833-03ea-11dc-a51d-0019b95d4f14.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: samba, ja-samba";

Modified: trunk/openvas-plugins/scripts/freebsd_trac2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_trac2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_trac2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(57081);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: trac, ja-trac";
  script_name(name);
@@ -46,10 +48,8 @@
 
 http://projects.edgewall.com/trac/wiki/ChangeLog
 http://lists.edgewall.com/archive/trac-announce/2006-July/000013.html
-http://www.vuxml.org/freebsd/b0d61f73-0e11-11db-a47b-000c2957fdf1.html
+http://www.vuxml.org/freebsd/b0d61f73-0e11-11db-a47b-000c2957fdf1.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: trac, ja-trac";

Modified: trunk/openvas-plugins/scripts/freebsd_vlc4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_vlc4.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_vlc4.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(68956);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-05 22:25:39 +0100 (Sat, 05 Mar 2011)");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: vlc");
 
@@ -45,10 +47,8 @@
 software upgrades.
 
 http://www.videolan.org/security/sa1102.html
-http://www.vuxml.org/freebsd/f9258873-2ee2-11e0-afcd-0015f2db7bde.html
+http://www.vuxml.org/freebsd/f9258873-2ee2-11e0-afcd-0015f2db7bde.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: vlc");

Modified: trunk/openvas-plugins/scripts/freebsd_wireshark5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_wireshark5.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_wireshark5.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(68494);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-11-17 03:33:48 +0100 (Wed, 17 Nov 2010)");
  script_tag(name:"cvss_base", value:"5.0");
   script_cve_id("CVE-2010-3445");
  script_tag(name:"risk_factor", value:"Medium");
@@ -50,10 +52,8 @@
 
 http://www.wireshark.org/lists/wireshark-announce/201010/msg00002.html
 http://www.wireshark.org/lists/wireshark-announce/201010/msg00001.html
-http://www.vuxml.org/freebsd/b2eaa7c2-e64a-11df-bc65-0022156e8794.html
+http://www.vuxml.org/freebsd/b2eaa7c2-e64a-11df-bc65-0022156e8794.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: wireshark");

Modified: trunk/openvas-plugins/scripts/freebsd_xtrlock.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_xtrlock.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsd_xtrlock.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,6 +29,8 @@
 {
  script_id(52994);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12316);
  script_cve_id("CVE-2005-0079");
  script_tag(name:"cvss_base", value:"4.6");
@@ -52,10 +54,8 @@
 http://www.debian.org/security/2005/dsa-649
 http://xforce.iss.net/xforce/xfdb/18991
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278191
-http://www.vuxml.org/freebsd/f7e8d2ca-410e-40b2-8748-3abd021e44a9.html
+http://www.vuxml.org/freebsd/f7e8d2ca-410e-40b2-8748-3abd021e44a9.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: xtrlock";

Modified: trunk/openvas-plugins/scripts/freebsdsa_jail2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_jail2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsdsa_jail2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(67508);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-06-03 22:55:24 +0200 (Thu, 03 Jun 2010)");
  script_tag(name:"cvss_base", value:"3.3");
  script_cve_id("CVE-2010-2022");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-10:04.jail.asc)");
@@ -61,8 +63,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:04.jail.asc
-Risk factor: Medium";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:04.jail.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_nd6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_nd6.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsdsa_nd6.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(61702);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-10-03 23:16:57 +0200 (Fri, 03 Oct 2008)");
  script_cve_id("CVE-2008-2476");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -54,8 +56,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-08:10.nd6.asc
-Risk factor: Critical";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-08:10.nd6.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_openssl5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_openssl5.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsdsa_openssl5.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -31,6 +31,8 @@
 {
  script_id(58634);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-5135");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -53,8 +55,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-07:08.openssl.asc
-Risk factor : High";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-07:08.openssl.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_zfs.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_zfs.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/freebsdsa_zfs.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,6 +30,8 @@
 {
  script_id(66663);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-11 23:48:26 +0100 (Mon, 11 Jan 2010)");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-10:03.zfs.asc)");
 
@@ -52,8 +54,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:03.zfs.asc
-Risk factor : High";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:03.zfs.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ftpd_any_cmd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ftpd_any_cmd.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ftpd_any_cmd.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,6 +26,8 @@
 {
  script_id(80062);;
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"risk_factor", value:"None");
  script_name( "Fake FTP server accepts any command");
  script_description(

Modified: trunk/openvas-plugins/scripts/gb_CESA-2007_1049_kernel_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2007_1049_kernel_centos3_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2007_1049_kernel_centos3_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,6 +27,8 @@
 {
   script_id(880316);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:31:09 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.9");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "CESA", value: "2007:1049");
@@ -74,10 +76,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2007-December/014479.html
+  http://lists.centos.org/pipermail/centos-announce/2007-December/014479.html";
 
-  Risk factor : Medium";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0240_xpdf_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0240_xpdf_centos4_x86_64.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0240_xpdf_centos4_x86_64.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880005);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0240");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-April/014846.html
+  http://lists.centos.org/pipermail/centos-announce/2008-April/014846.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of xpdf");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0240_xpdf_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0288_samba_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0288_samba_centos3_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0288_samba_centos3_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880059);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0288");
@@ -59,10 +61,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-May/014939.html
+  http://lists.centos.org/pipermail/centos-announce/2008-May/014939.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of samba");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0288_samba_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0584_pidgin_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0584_pidgin_centos3_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0584_pidgin_centos3_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880071);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0584");
@@ -62,10 +64,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-July/015085.html
+  http://lists.centos.org/pipermail/centos-announce/2008-July/015085.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of pidgin");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0584_pidgin_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0908_thunderbird_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0908_thunderbird_centos4_x86_64.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0908_thunderbird_centos4_x86_64.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880289);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0908");
@@ -70,10 +72,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-October/015295.html
+  http://lists.centos.org/pipermail/centos-announce/2008-October/015295.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of thunderbird");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0908_thunderbird_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0946_ed_centos4_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0946_ed_centos4_x86_64.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0946_ed_centos4_x86_64.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880018);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0946");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-October/015356.html
+  http://lists.centos.org/pipermail/centos-announce/2008-October/015356.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of ed");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0946_ed_centos4_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0977_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0977_seamonkey_centos4_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0977_seamonkey_centos4_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880221);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0977");
@@ -59,10 +61,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-November/015422.html
+  http://lists.centos.org/pipermail/centos-announce/2008-November/015422.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0977_seamonkey_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0430_xpdf_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0430_xpdf_centos4_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0430_xpdf_centos4_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880889);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:0430");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0430_xpdf_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_1671_kernel_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_1671_kernel_centos4_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_1671_kernel_centos4_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880764);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:1671");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_1671_kernel_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0162_openssl_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0162_openssl_centos5_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0162_openssl_centos5_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880641);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0162");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0162_openssl_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_1089_systemtap_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1089_systemtap_centos5_i386.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1089_systemtap_centos5_i386.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880982);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:1089");
   script_cve_id("CVE-2011-2503");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_1089_systemtap_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0240-01_xpdf.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0240-01_xpdf.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0240-01_xpdf.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870090);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2008:0240-01");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-April/msg00022.html
+  https://www.redhat.com/archives/rhsa-announce/2008-April/msg00022.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of xpdf");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0240-01_xpdf.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870132);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 10:44:38 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2008:0581-01");
@@ -58,10 +60,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-July/msg00013.html
+  https://www.redhat.com/archives/rhsa-announce/2008-July/msg00013.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bluez-libs and bluez-utils");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0581-01_bluez-libs_bluez-utils.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0892-01_xen.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0892-01_xen.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0892-01_xen.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870027);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.9");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "RHSA", value: "2008:0892-01");
@@ -66,10 +68,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-October/msg00001.html
+  https://www.redhat.com/archives/rhsa-announce/2008-October/msg00001.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of xen");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0892-01_xen.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0002-01_PyXML.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0002-01_PyXML.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0002-01_PyXML.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870202);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-15 10:29:41 +0100 (Fri, 15 Jan 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "RHSA", value: "2010:0002-01");
@@ -63,10 +65,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2010-January/msg00000.html
+  https://www.redhat.com/archives/rhsa-announce/2010-January/msg00000.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of PyXML");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0002-01_PyXML.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0547-01_firefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0547-01_firefox.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0547-01_firefox.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870292);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-23 16:10:25 +0200 (Fri, 23 Jul 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0547-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0547-01_firefox.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0679-01_rpm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0679-01_rpm.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0679-01_rpm.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870322);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 14:21:00 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2010:0679-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0679-01_rpm.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1359-01_xorg-x11-server.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1359-01_xorg-x11-server.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1359-01_xorg-x11-server.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870497);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-10 16:05:48 +0200 (Mon, 10 Oct 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2011:1359-01");
   script_cve_id("CVE-2010-4818", "CVE-2010-4819");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_1359-01_xorg-x11-server.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_flash_player_swf_proc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_flash_player_swf_proc_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_adobe_flash_player_swf_proc_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_flash_player_swf_proc_vuln.nasl 726 2008-12-18 18:12:53Z dec $
+# $Id$
 #
 # Adobe Flash Player for Linux SWF Processing Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800087);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-19 13:40:09 +0100 (Fri, 19 Dec 2008)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-5499");
@@ -57,8 +59,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Adobe Flash Player");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_flash_player_swf_proc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_vuln_feb10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_vuln_feb10_lin.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_vuln_feb10_lin.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_prdts_mult_vuln_feb10_lin.nasl 7295 2010-02-16 12:24:34Z feb $
+# $Id$
 #
 # Adobe Flash Player/Air Multiple Vulnerabilities - feb10 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800476);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-19 11:58:13 +0100 (Fri, 19 Feb 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0186", "CVE-2010-0187");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Adobe Flash Player/Air");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_vuln_feb10_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl 12081 2010-11-23 10:30:34Z nov $
+# $Id$
 #
 # Adobe Reader 'printSeps()' Function Heap Corruption Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801546);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-23 14:41:37 +0100 (Tue, 23 Nov 2010)");
   script_cve_id("CVE-2010-4091");
   script_bugtraq_id(44638);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_reader_printseps_mem_crptn_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_bugzilla_45982.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_bugzilla_45982.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_bugzilla_45982.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(103045);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-26 13:20:54 +0100 (Wed, 26 Jan 2011)");
  script_bugtraq_id(45982);
  script_cve_id("CVE-2010-4567","CVE-2010-4568","CVE-2010-4569","CVE-2010-4570","CVE-2011-0046","CVE-2011-0048");
  script_tag(name:"cvss_base", value:"7.5");
- script_version("1.0-$Revision$");
 
  script_name("Bugzilla Multiple Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_bugzilla_45982.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ccproxy_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ccproxy_detect.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ccproxy_detect.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ccproxy_detect.nasl 831 2009-03-13 10:45:02Z mar $
+# $Id$
 #
 # CCProxy Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(800538);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-16 10:38:04 +0100 (Mon, 16 Mar 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("CCProxy Version Detection");
   desc = "
   Overview: This script detects the version of CCProxy and sets the
-  version in KB.
+  version in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of CCProxy");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ccproxy_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_clamav_remote_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_clamav_remote_dos_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_clamav_remote_dos_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_clamav_remote_dos_vuln.nasl 0473 2008-11-24 15:09:31Z nov $
+# $Id$
 #
 # ClamAV get_unicode_name() Off-By-One Heap Based BOF Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800067);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-11-26 16:25:46 +0100 (Wed, 26 Nov 2008)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-5050");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the Version of ClamAV");


Property changes on: trunk/openvas-plugins/scripts/gb_clamav_remote_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_cruxcms_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_cruxcms_xss_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_cruxcms_xss_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_cruxcms_xss_vuln.nasl 10254 2010-07-15 10:50:29 jul $
+# $Id$
 #
 # CruxCMS 'txtusername' Parameter Cross Site Scripting Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801382);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-19 10:09:06 +0200 (Mon, 19 Jul 2010)");
   script_cve_id("CVE-2010-2717");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/gb_cruxcms_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_f-prot_av_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_f-prot_av_dos_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_f-prot_av_dos_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_f-prot_av_dos_vuln_lin.nasl 794 2009-01-02 12:58:24Z jan $
+# $Id$
 #
 # F-PROT AV 'ELF' Header Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800325);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-13 15:40:34 +0100 (Tue, 13 Jan 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2008-5747");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 4.2
-  Risk factor: Medium";
+    CVSS Temporal Score : 4.2";
 
   script_description(desc);
   script_summary("Check for the Version of F-PROT Antivirus");


Property changes on: trunk/openvas-plugins/scripts/gb_f-prot_av_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_family_connections_40043.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_family_connections_40043.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_family_connections_40043.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100634);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-11 20:07:01 +0200 (Tue, 11 May 2010)");
  script_bugtraq_id(40043);
- script_version ("1.0-$Revision$");
 
  script_name("Family Connections 2.2.3 Multiple SQL Injection Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_family_connections_40043.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_100_ed_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_100_ed_fc6.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_100_ed_fc6.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861578);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 15:48:41 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-100");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00112.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00112.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of ed");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_100_ed_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2649_drupal_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2649_drupal_fc7.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2649_drupal_fc7.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861489);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-2649");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of drupal");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2649_drupal_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_3666_phpMyAdmin_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_3666_phpMyAdmin_fc7.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_3666_phpMyAdmin_fc7.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861585);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-3666");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00777.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00777.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of phpMyAdmin");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_3666_phpMyAdmin_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_4305_eggdrop_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_4305_eggdrop_fc8.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_4305_eggdrop_fc8.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861013);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:27:46 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-4305");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00336.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00336.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of eggdrop");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_4305_eggdrop_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_614_libexif_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_614_libexif_fc6.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_614_libexif_fc6.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861355);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_xref(name: "FEDORA", value: "2007-614");
   script_cve_id("CVE-2006-4168");
   script_tag(name:"cvss_base", value:"6.8");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-June/msg00628.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-June/msg00628.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libexif");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_614_libexif_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_1629_kernel-xen-2.6_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_1629_kernel-xen-2.6_fc7.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_1629_kernel-xen-2.6_fc7.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860577);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 14:16:57 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-1629");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00485.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel-xen-2.6");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_1629_kernel-xen-2.6_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_1728_scponly_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_1728_scponly_fc7.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_1728_scponly_fc7.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860040);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 14:16:57 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"8.5");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-1728");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of scponly");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_1728_scponly_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_2616_libsilc_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_2616_libsilc_fc7.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_2616_libsilc_fc7.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860341);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:22:52 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-2616");
   script_name( "Fedora Update for libsilc FEDORA-2008-2616");
@@ -42,10 +44,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00513.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00513.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libsilc");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_2616_libsilc_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_5454_kernel_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_5454_kernel_fc8.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_5454_kernel_fc8.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860557);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 16:50:22 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-5454");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00743.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00743.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_5454_kernel_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_6127_openvrml_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_6127_openvrml_fc8.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_6127_openvrml_fc8.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860360);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:01:32 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-6127");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00203.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00203.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openvrml");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_6127_openvrml_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_9791_htop_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_9791_htop_fc8.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_9791_htop_fc8.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860553);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:07:33 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-9791");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00527.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00527.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of htop");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_9791_htop_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_0964_gzip_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_0964_gzip_fc11.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_0964_gzip_fc11.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861682);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-0964");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034495.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034495.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of gzip");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_0964_gzip_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_10083_dhcp_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_10083_dhcp_fc11.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_10083_dhcp_fc11.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862173);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-25 12:25:26 +0200 (Fri, 25 Jun 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-10083");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_10083_dhcp_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_10361_gnome-python2-extras_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_10361_gnome-python2-extras_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_10361_gnome-python2-extras_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862195);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-25 12:25:26 +0200 (Fri, 25 Jun 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-10361");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_10361_gnome-python2-extras_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_10469_mingw32-libtiff_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_10469_mingw32-libtiff_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_10469_mingw32-libtiff_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862222);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-12 11:56:20 +0200 (Mon, 12 Jul 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-10469");
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_10469_mingw32-libtiff_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_10876_kernel_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_10876_kernel_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_10876_kernel_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(862237);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-12 11:56:20 +0200 (Mon, 12 Jul 2010)");
   script_tag(name:"cvss_base", value:"10.0");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-10876");
   script_cve_id("CVE-2010-2478", "CVE-2010-2071", "CVE-2010-1437", "CVE-2010-2495");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_10876_kernel_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_11428_maniadrive_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_11428_maniadrive_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_11428_maniadrive_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862343);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-30 16:59:25 +0200 (Mon, 30 Aug 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-11428");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_11428_maniadrive_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_12269_roundup_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_12269_roundup_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_12269_roundup_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862426);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-27 08:14:44 +0200 (Mon, 27 Sep 2010)");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-12269");
   script_tag(name:"cvss_base", value:"4.3");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_12269_roundup_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14235_kernel_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14235_kernel_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14235_kernel_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862387);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 14:21:00 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14235");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14235_kernel_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14236_squid_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14236_squid_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14236_squid_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862417);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-22 08:32:53 +0200 (Wed, 22 Sep 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-14236");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14236_squid_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14411_phpMyAdmin_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14411_phpMyAdmin_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14411_phpMyAdmin_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862398);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 14:21:00 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14411");
   script_name("Fedora Update for phpMyAdmin FEDORA-2010-14411");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14411_phpMyAdmin_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_15070_gnome-web-photo_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_15070_gnome-web-photo_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_15070_gnome-web-photo_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862425);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-27 08:14:44 +0200 (Mon, 27 Sep 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-15070");
   script_name("Fedora Update for gnome-web-photo FEDORA-2010-15070");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_15070_gnome-web-photo_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_15534_cgit_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_15534_cgit_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_15534_cgit_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862446);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-19 15:54:15 +0200 (Tue, 19 Oct 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-15534");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_15534_cgit_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862482);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-16883");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_16883_gnome-web-photo_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1720_systemtap_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1720_systemtap_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1720_systemtap_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861649);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-1720");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of systemtap");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1720_systemtap_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_18890_seamonkey_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_18890_seamonkey_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_18890_seamonkey_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862750);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-28 07:11:56 +0100 (Tue, 28 Dec 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-18890");
   script_name("Fedora Update for seamonkey FEDORA-2010-18890");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_18890_seamonkey_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_19330_wordpress-mu_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_19330_wordpress-mu_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_19330_wordpress-mu_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862781);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)");
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-19330");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_19330_wordpress-mu_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_4407_hamlib_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_4407_hamlib_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_4407_hamlib_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861857);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-4407");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038467.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038467.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of hamlib");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_4407_hamlib_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_5545_libnids_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_5545_libnids_fc11.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_5545_libnids_fc11.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861816);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-5545");
   script_name("Fedora Update for libnids FEDORA-2010-5545");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038387.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038387.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libnids");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_5545_libnids_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_6096_oxygen-icon-theme_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_6096_oxygen-icon-theme_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_6096_oxygen-icon-theme_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861920);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-19 16:47:49 +0200 (Mon, 19 Apr 2010)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-6096");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_6096_oxygen-icon-theme_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_8805_krb5_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_8805_krb5_fc12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_8805_krb5_fc12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861973);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-8805");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_8805_krb5_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_9320_xinha_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_9320_xinha_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_9320_xinha_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862131);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-11 13:46:51 +0200 (Fri, 11 Jun 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-9320");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_9320_xinha_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_0120_Django_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_0120_Django_fc14.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_0120_Django_fc14.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862795);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-14 16:07:43 +0100 (Fri, 14 Jan 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-0120");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_0120_Django_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_11084_mozvoikko_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11084_mozvoikko_fc14.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11084_mozvoikko_fc14.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863460);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-27 16:37:49 +0200 (Sat, 27 Aug 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-11084");
   script_name("Fedora Update for mozvoikko FEDORA-2011-11084");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_11084_mozvoikko_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_11087_thunderbird-lightning_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11087_thunderbird-lightning_fc15.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11087_thunderbird-lightning_fc15.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863454);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-27 16:37:49 +0200 (Sat, 27 Aug 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-11087");
   script_name("Fedora Update for thunderbird-lightning FEDORA-2011-11087");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_11087_thunderbird-lightning_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_11189_hplip_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11189_hplip_fc15.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11189_hplip_fc15.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863512);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-16 17:22:17 +0200 (Fri, 16 Sep 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-11189");
   script_cve_id("CVE-2011-2722");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_11189_hplip_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862877);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-08 14:34:13 +0100 (Tue, 08 Mar 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-2133");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_2743_clamav_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_2743_clamav_fc14.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_2743_clamav_fc14.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862889);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-15 14:58:18 +0100 (Tue, 15 Mar 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-2743");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_2743_clamav_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_3827_libtiff_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_3827_libtiff_fc13.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_3827_libtiff_fc13.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862987);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-19 07:58:39 +0200 (Tue, 19 Apr 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2011-3827");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_3827_libtiff_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8021_fetchmail_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8021_fetchmail_fc14.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8021_fetchmail_fc14.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863297);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-24 16:46:35 +0200 (Fri, 24 Jun 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-8021");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8021_fetchmail_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8647_gnome-web-photo_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8647_gnome-web-photo_fc14.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8647_gnome-web-photo_fc14.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863337);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-12 08:00:26 +0200 (Tue, 12 Jul 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-8647");
   script_name("Fedora Update for gnome-web-photo FEDORA-2011-8647");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8647_gnome-web-photo_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_9132_phpMyAdmin_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_9132_phpMyAdmin_fc15.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_9132_phpMyAdmin_fc15.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863363);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-18 15:23:56 +0200 (Mon, 18 Jul 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-9132");
   script_name("Fedora Update for phpMyAdmin FEDORA-2011-9132");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_9132_phpMyAdmin_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_9311_squirrelmail_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_9311_squirrelmail_fc15.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_9311_squirrelmail_fc15.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863384);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-27 14:47:11 +0200 (Wed, 27 Jul 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-9311");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_9311_squirrelmail_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_9891_dbus_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_9891_dbus_fc15.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_9891_dbus_fc15.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863400);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-12 15:49:01 +0200 (Fri, 12 Aug 2011)");
   script_tag(name:"cvss_base", value:"4.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-9891");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_9891_dbus_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_firefox_keygen_dos_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_firefox_keygen_dos_vuln_lin.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_firefox_keygen_dos_vuln_lin.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800625);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-04 07:18:37 +0200 (Thu, 04 Jun 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-1828", "CVE-2009-1827 ");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 4.5
-  Risk factor: Medium";
+    CVSS Temporal Score : 4.5";
 
   script_description(desc);
   script_summary("Check for the version of Firefox");


Property changes on: trunk/openvas-plugins/scripts/gb_firefox_keygen_dos_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_firestats_41548.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_firestats_41548.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_firestats_41548.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100710);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-13 12:45:31 +0200 (Tue, 13 Jul 2010)");
  script_bugtraq_id(41548);
- script_version ("1.0-$Revision$");
 
  script_name("FireStats Multiple Cross Site Scripting Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_firestats_41548.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_freefloat_ftp_abor_cmd_bof_vuln.nasl 16160 2011-07-19 16:00:15Z jul $
+# $Id$
 #
 # Freefloat FTP Server POST Auth 'ABOR' Command Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802030);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-22 12:16:19 +0200 (Fri, 22 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_name("Freefloat FTP Server POST Auth 'ABOR' Command Buffer Overflow Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_gizmo5_detect_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_gizmo5_detect_lin.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_gizmo5_detect_lin.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_gizmo5_detect_lin.nasl 3363 2009-07-09 20:38:29Z jul $
+# $Id$
 #
 # Gizmo5 Version Detection (Linux)
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(800832);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-07-15 13:05:34 +0200 (Wed, 15 Jul 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Gizmo5 Version Detection (Linux)");
   desc = "
 
   Overview: The script is detects the installed version of Gizmo5 and sets
-  the version in KB.
+  the version in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set the Version of Gizmo5 Products");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_gizmo5_detect_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_aug11_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_aug11_macosx.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_aug11_macosx.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_google_chrome_mult_vuln_aug11_macosx.nasl 16556 2011-08-09 12:29:14 aug $
+# $Id$
 #
 # Google Chrome Multiple Vulnerabilities - August11 (MacOSX)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802319);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-10 13:49:51 +0200 (Wed, 10 Aug 2011)");
   script_cve_id("CVE-2011-2358", "CVE-2011-2359", "CVE-2011-2360", "CVE-2011-2361",
                 "CVE-2011-2783", "CVE-2011-2784", "CVE-2011-2785", "CVE-2011-2786",
                 "CVE-2011-2787", "CVE-2011-2788", "CVE-2011-2789", "CVE-2011-2790",


Property changes on: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_aug11_macosx.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_oct11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_oct11_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_oct11_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_google_chrome_mult_vuln_oct11_win.nasl 17783 2011-10-13 11:11:11 oct $
+# $Id$
 #
 # Google Chrome Multiple Vulnerabilities - October11 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802255);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-18 15:48:35 +0200 (Tue, 18 Oct 2011)");
   script_cve_id("CVE-2011-2876", "CVE-2011-2877", "CVE-2011-2878", "CVE-2011-2879",
                 "CVE-2011-2880", "CVE-2011-2881", "CVE-2011-3873");
   script_bugtraq_id(49938);


Property changes on: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_oct11_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_power_manager_csrf_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_power_manager_csrf_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_hp_power_manager_csrf_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_hp_power_manager_csrf_vuln.nasl 13692 2011-02-11 11:33:29 feb $
+# $Id$
 #
 # HP Power Manager Cross Site Request Forgery (CSRF) and XSS Vulnerability
 #
@@ -29,7 +29,9 @@
 if(description)
 {
   script_id(801591);
-  script_version("$Revision: 1.1$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-15 08:14:35 +0100 (Tue, 15 Feb 2011)");
   script_cve_id("CVE-2011-0277", "CVE-2011-0280");
   script_bugtraq_id(46258);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/gb_hp_power_manager_csrf_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835070);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00148");
   script_name( "HP-UX Update for xntpd(1M) HPSBUX00148");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994050-2
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994050-2";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of xntpd(1M)");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00148.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835015);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "01104");
   script_name( "HP-UX Update for System Administration Manager (SAM) HPSBUX01104");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00896487-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00896487-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of System Administration Manager (SAM)");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX01104.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835173);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "HPSBUX", value: "02306");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01328657-2
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01328657-2";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of ARPA Transport");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02306.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02408.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02408.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02408.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835191);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"cvss_base", value:"4.9");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "HPSBUX", value: "02408");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01666473-2
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01666473-2";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of NFS");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02408.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_interchange_web_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_interchange_web_detect.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_interchange_web_detect.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -38,7 +38,9 @@
 
  script_tag(name:"risk_factor", value:"None"); 
  script_id(100552);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-03-25 19:45:44 +0100 (Thu, 25 Mar 2010)");
 
  script_name("Interchange Detection");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_interchange_web_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_048_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_048_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_048_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830300);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:048-1");
   script_name( "Mandriva Update for x11-server MDKA-2007:048-1 (x11-server)");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-05/msg00037.php
+  http://lists.mandriva.com/security-announce/2007-05/msg00037.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of x11-server");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_048_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_096.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_096.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_096.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830050);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:096");
   script_name( "Mandriva Update for timezone MDKA-2007:096 (timezone)");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-10/msg00018.php
+  http://lists.mandriva.com/security-announce/2007-10/msg00018.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of timezone");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_096.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_124.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_124.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_124.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830152);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:124");
   script_name( "Mandriva Update for openafs MDKA-2007:124 (openafs)");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-11/msg00058.php
+  http://lists.mandriva.com/security-announce/2007-11/msg00058.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of openafs");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_124.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_097.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_097.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_097.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830153);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"4.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDKSA", value: "2007:097");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-05/msg00005.php
+  http://lists.mandriva.com/security-announce/2007-05/msg00005.php";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of xscreensaver");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_097.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_062.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_062.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830759);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:062");
   script_name( "Mandriva Update for drakxtools MDVA-2008:062 (drakxtools)");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-05/msg00013.php
+  http://lists.mandriva.com/security-announce/2008-05/msg00013.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of drakxtools");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_062.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_088.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_088.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_088.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830939);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:088");
   script_name("Mandriva Update for rsnapshot MDVA-2010:088 (rsnapshot)");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-03/msg00003.php
+  http://lists.mandriva.com/security-announce/2010-03/msg00003.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of rsnapshot");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_088.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_099.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_099.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_099.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830942);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:099");
   script_name("Mandriva Update for foomatic-db MDVA-2010:099 (foomatic-db)");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2010-03/msg00024.php
+  http://lists.mandriva.com/security-announce/2010-03/msg00024.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of foomatic-db");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_099.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_000.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_000.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_000.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831298);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2011:000");
   script_name("Mandriva Update for openoffice.org MDVA-2011:000 (openoffice.org)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_000.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_032.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_032.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_032.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830567);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2008:032");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-02/msg00002.php
+  http://lists.mandriva.com/security-announce/2008-02/msg00002.php";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of boost");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_032.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_234.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_234.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_234.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830503);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2008:234");
@@ -82,10 +84,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-11/msg00026.php
+  http://lists.mandriva.com/security-announce/2008-11/msg00026.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_234.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_252.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_252.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_252.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831286);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-28 07:11:56 +0100 (Tue, 28 Dec 2010)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2010:252");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_252.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_036.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_036.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_036.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831339);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-28 16:24:14 +0100 (Mon, 28 Feb 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2011:036");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_036.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_106.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_106.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_106.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(831415);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-06 16:56:27 +0200 (Mon, 06 Jun 2011)");
   script_tag(name:"cvss_base", value:"5.0");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2011:106");
   script_cve_id("CVE-2011-1752", "CVE-2011-1783", "CVE-2011-1921");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_106.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_148.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_148.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_148.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831466);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-14 14:22:41 +0200 (Fri, 14 Oct 2011)");
   script_tag(name:"cvss_base", value:"3.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2011:148");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_148.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_sep11_win02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_sep11_win02.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_sep11_win02.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_mozilla_prdts_mult_vuln_sep11_win02.nasl 16832 2011-09-06 12:15:33Z sep $
+# $Id$
 #
 # Mozilla Products Multiple Vulnerabilities - Sep 11 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802153);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-09 17:36:48 +0200 (Fri, 09 Sep 2011)");
   script_cve_id("CVE-2011-2985", "CVE-2011-2986", "CVE-2011-2987",
                 "CVE-2011-2988", "CVE-2011-2989", "CVE-2011-2991",
                 "CVE-2011-2992");


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_sep11_win02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms07-042.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms07-042.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ms07-042.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms07-042.nasl 13101 2011-01-07 17:11:11Z jan $
+# $Id$
 #
 # Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801715);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-14 09:03:25 +0100 (Fri, 14 Jan 2011)");
   script_cve_id("CVE-2007-2223");
   script_bugtraq_id(25301);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/gb_ms07-042.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_kernel_prv_esc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_kernel_prv_esc_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ms_kernel_prv_esc_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_kernel_prv_esc_vuln.nasl 6919 2010-01-21 12:40:05Z jan $
+# $Id$
 #
 # Microsoft Windows #GP Trap Handler Privilege Escalation Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800442);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-22 16:43:14 +0100 (Fri, 22 Jan 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0232");
@@ -71,8 +73,7 @@
 
   CVSS Score:
     CVSS Base Score      : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score  : 8.0
-  Risk factor: Critical";
+    CVSS Temporal Score  : 8.0";
 
   script_description(desc);
   script_summary("Check for the Microsoft Windows");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_kernel_prv_esc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_windows_media_player_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_windows_media_player_bof_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ms_windows_media_player_bof_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_windows_media_player_bof_vuln.nasl 7495 2010-03-01 13:48:24Z mar $
+# $Id$
 #
 # Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800480);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 12:36:32 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2010-0718");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score      : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score  : 6.1
-  Risk factor: High";
+    CVSS Temporal Score  : 6.1";
 
   script_description(desc);
   script_summary("Check for the Version of Windows Media Player");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_windows_media_player_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_windows_stuxnet_unspecified_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_windows_stuxnet_unspecified_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ms_windows_stuxnet_unspecified_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_windows_stuxnet_unspecified_vuln.nasl 11483 2010-10-12 09:32:12Z oct $
+# $Id$
 #
 # Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801527);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-18 15:37:53 +0200 (Mon, 18 Oct 2010)");
   script_cve_id("CVE-2010-3888", "CVE-2010-3889");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_windows_stuxnet_unspecified_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ocs_inventory_35593.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ocs_inventory_35593.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ocs_inventory_35593.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100868);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-10-25 12:51:03 +0200 (Mon, 25 Oct 2010)");
  script_bugtraq_id(35593);
  script_cve_id("CVE-2009-0667");
- script_version ("1.0-$Revision$");
 
  script_name("OCS Inventory NG Agent 'Backend.pm' Perl Module Handling Code Execution Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_ocs_inventory_35593.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl 3739 2009-08-04 17:22:24Z aug $
+# $Id$
 #
 # OpenSSL/GnuTLS SSL Server Spoofing Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800917);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-05 14:14:14 +0200 (Wed, 05 Aug 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-2409");
@@ -59,8 +61,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:P/A:N)
-    CVSS Temporal Score : 3.7
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.7";
 
   script_description(desc);
   script_summary("Check for the version of OpenSSL/GnuTLS");


Property changes on: trunk/openvas-plugins/scripts/gb_openssl_n_gnutls_ssl_spoof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_31612.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_31612.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_php_31612.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100582);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-04-19 20:46:01 +0200 (Mon, 19 Apr 2010)");
  script_bugtraq_id(31612);
  script_cve_id("CVE-2008-3660");
- script_version ("1.0-$Revision$");
 
  script_name("PHP FastCGI Module File Extension Denial Of Service Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_php_31612.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_crypt_func_sec_bypass_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_crypt_func_sec_bypass_vuln_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_php_crypt_func_sec_bypass_vuln_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_php_crypt_func_sec_bypass_vuln_win.nasl 16883 2011-09-06 15:42:56Z sep $
+# $Id$
 #
 # PHP 'crypt()' Function Security Bypass Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802329);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-07 08:36:57 +0200 (Wed, 07 Sep 2011)");
   script_cve_id("CVE-2011-3189");
   script_bugtraq_id(48259);
   script_tag(name:"cvss_base", value:"4.3");


Property changes on: trunk/openvas-plugins/scripts/gb_php_crypt_func_sec_bypass_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_imap_do_open_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_imap_do_open_dos_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_php_imap_do_open_dos_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_php_imap_do_open_dos_vuln.nasl 12493 2011-01-28 18:42:56Z jan $
+# $Id$
 #
 # PHP 'ext/imap/php_imap.c' Use After Free Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801583);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-31 05:37:34 +0100 (Mon, 31 Jan 2011)");
   script_cve_id("CVE-2010-4150");
   script_bugtraq_id(44980);
   script_tag(name:"cvss_base", value:"5.0");


Property changes on: trunk/openvas-plugins/scripts/gb_php_imap_do_open_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_pligg_cms_41729.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_pligg_cms_41729.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_pligg_cms_41729.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100719);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-16 12:38:11 +0200 (Fri, 16 Jul 2010)");
  script_bugtraq_id(41729);
- script_version ("1.0-$Revision$");
 
  script_name("Pligg 'search.php' Cross Site Scripting Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_pligg_cms_41729.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_prtg_network_monitor_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_prtg_network_monitor_detect.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_prtg_network_monitor_detect.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -36,7 +36,9 @@
  
  script_tag(name:"risk_factor", value:"None");
  script_id(103048);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-27 12:55:42 +0100 (Thu, 27 Jan 2011)");
 
  script_name("PRTG Network Monitor Detection");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_prtg_network_monitor_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_mar09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_mar09_lin.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_mar09_lin.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_seamonkey_mult_vuln_mar09_lin.nasl 758 2009-03-05 17:57:33Z mar $
+# $Id$
 #
 # Mozilla Seamonkey Multiple Vulnerabilities Mar-09 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800366);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-10 11:59:23 +0100 (Tue, 10 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0771", "CVE-2009-0772", "CVE-2009-0773", "CVE-2009-0774",
@@ -81,8 +83,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.3
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.3";
 
   script_description(desc);
   script_summary("Check for the version of Seamonkey");


Property changes on: trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_mar09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_serva32_web_server_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_serva32_web_server_dos_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_serva32_web_server_dos_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_serva32_web_server_dos_vuln.nasl 15185 2011-05-10 17:30:34Z may $
+# $Id$
 #
 # Serva32 Webserver Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802020);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-23 15:31:07 +0200 (Mon, 23 May 2011)");
   script_bugtraq_id(47760);
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_serva32_web_server_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_109668_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_109668_07.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_109668_07.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855247);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:37:58 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "109668-07");
   script_name( "Solaris Update for /usr/lib/inet/xntpd and /usr/sbin/ntpdate 109668-07");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-109668-07-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-109668-07-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of /usr/lib/inet/xntpd and /usr/sbin/ntpdate");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_109668_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_110916_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_110916_07.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_110916_07.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855569);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "110916-07");
   script_name( "Solaris Update for sort 110916-07");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110916-07-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110916-07-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of sort");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_110916_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_111647_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_111647_01.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_111647_01.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855172);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "111647-01");
   script_name( "Solaris Update for BCP libmle buffer overflow 111647-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-111647-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-111647-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of BCP libmle buffer overflow");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_111647_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_111882_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_111882_03.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_111882_03.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855577);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "111882-03");
   script_name( "Solaris Update for /usr/kernel/strmod/telmod 111882-03");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-111882-03-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-111882-03-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of /usr/kernel/strmod/telmod");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_111882_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_114265_19.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_114265_19.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_114265_19.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855749);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-13 15:16:45 +0200 (Tue, 13 Oct 2009)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "114265-19");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114265-19-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114265-19-1";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of in.dhcpd libresolv and BIND9");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_114265_19.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_114432_34.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_114432_34.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_114432_34.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855394);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:24:08 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "114432-34");
   script_name( "Solaris Update for libc 114432-34");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114432-34-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114432-34-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libc");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_114432_34.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_114636_04.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_114636_04.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_114636_04.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855319);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:24:08 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "114636-04");
   script_name( "Solaris Update for kcms_server and kcms_configure 114636-04");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114636-04-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114636-04-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kcms_server and kcms_configure");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_114636_04.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_114984_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_114984_02.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_114984_02.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855028);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:24:08 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "114984-02");
   script_name( "Solaris Update for /usr/kernel/fs/namefs 114984-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114984-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114984-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of /usr/kernel/fs/namefs");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_114984_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_118918_24.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_118918_24.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_118918_24.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855234);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "118918-24");
   script_name( "Solaris Update for Solaris Crypto Framework 118918-24");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-118918-24-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-118918-24-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Solaris Crypto Framework");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_118918_24.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_119903_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_119903_02.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_119903_02.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855246);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "119903-02");
   script_name( "Solaris Update for OpenWindows 3.7.3 119903-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119903-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-119903-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of OpenWindows 3.7.3");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_119903_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_125332_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_125332_06.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_125332_06.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855665);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-23 10:48:35 +0200 (Wed, 23 Sep 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "125332-06");
   script_name("Solaris Update for JDS 3 125332-06");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-125332-06-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-125332-06-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of JDS 3");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_125332_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_138827_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_138827_06.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_138827_06.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855837);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-03 13:24:57 +0100 (Wed, 03 Feb 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "138827-06");
   script_name("Solaris Update for PostgreSQL 8.3 core 138827-06");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138827-06-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138827-06-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of PostgreSQL 8.3 core");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_138827_06.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_141415_10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_141415_10.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_141415_10.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855794);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-13 15:16:45 +0200 (Tue, 13 Oct 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "141415-10");
   script_name("Solaris Update for kernel 141415-10");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-141415-10-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-141415-10-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_141415_10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_142676_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_142676_02.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_solaris_142676_02.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855883);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-05 12:48:43 +0100 (Fri, 05 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "142676-02");
   script_name("Solaris Update for mpt_sas  with mdb/kmdb support 142676-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-142676-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-142676-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of mpt_sas  with mdb/kmdb support");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_142676_02.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840150);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "428-1");
@@ -78,10 +80,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-February/000491.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-February/000491.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of firefox vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_428_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_475_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_475_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_475_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840083);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "475-1");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-June/000548.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-June/000548.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of evolution-data-server vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_475_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840163);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "511-2");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-September/000588.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-September/000588.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of krb5, librpcsecgss vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_511_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_579_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_579_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_579_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840201);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "579-1");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-February/000666.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-February/000666.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of qt4-x11 vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_579_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_4.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_4.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840338);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "612-4");
@@ -86,10 +88,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000708.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000708.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ssl-cert vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_4.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_876_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_876_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_876_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840360);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-15 10:29:41 +0100 (Fri, 15 Jan 2010)");
   script_tag(name:"cvss_base", value:"6.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "876-1");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001018.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001018.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of PostgreSQL vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_876_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840375);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-22 10:23:05 +0100 (Fri, 22 Jan 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "890-1");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001033.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001033.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of expat vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl 458 2008-12-01 12:52:40Z dec $
+# $Id$
 #
 # VMware Products Trap Flag In-Guest Privilege Escalation Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800071);
-  script_version("$Revision: 1.1 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-15 15:44:51 +0100 (Mon, 15 Dec 2008)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-4915", "CVE-2008-4917");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.9 (AV:L/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 5.1
-  Risk factor: High";
+    CVSS Temporal Score : 5.1";
 
   script_description(desc);
   script_summary("Check for the version of VMware Products");


Property changes on: trunk/openvas-plugins/scripts/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_webid_48554.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_webid_48554.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_webid_48554.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103186);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-07-06 13:49:20 +0200 (Wed, 06 Jul 2011)");
  script_bugtraq_id(48554);
- script_version ("1.0-$Revision$");
 
  script_name("WeBid 'converter.php' Multiple Remote PHP Code Injection Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_webid_48554.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_wow_activex_mult_remote_code_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wow_activex_mult_remote_code_exec_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/gb_wow_activex_mult_remote_code_exec_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_wow_activex_mult_remote_code_exec_vuln.nasl 937 2009-02-04 15:40:24Z feb $
+# $Id$
 #
 # WoW ActiveX Multiple Remote Code Execution Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800224);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-05 14:42:09 +0100 (Thu, 05 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0389");
@@ -67,8 +69,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 8.0
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.0";
 
   script_description(desc);
   script_summary("Check for the killbit of WOW ActiveX Control");


Property changes on: trunk/openvas-plugins/scripts/gb_wow_activex_mult_remote_code_exec_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200503_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200503_07.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200503_07.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54872);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200503-07 (phpMyAdmin)";
  script_name(name);
@@ -49,10 +51,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=83792
 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-1
 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-2
-http://sourceforge.net/tracker/index.php?func=detail&aid=1113788&group_id=23067&atid=377408
+http://sourceforge.net/tracker/index.php?func=detail&aid=1113788&group_id=23067&atid=377408";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200503-07 (phpMyAdmin)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200503_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200510_12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200510_12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200510_12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(55639);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(15060);
  script_cve_id("CVE-2005-2971");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200510-12 (koffice, kword)";
@@ -54,10 +56,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200510-12
 http://bugs.gentoo.org/show_bug.cgi?id=108411
-http://www.kde.org/info/security/advisory-20051011-1.txt
+http://www.kde.org/info/security/advisory-20051011-1.txt";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200510-12 (koffice, kword)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200510_12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200510_23.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200510_23.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200510_23.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(55781);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Low");
  name = "Gentoo Security Advisory GLSA 200510-23 (tikiwiki)";
  script_name(name);
@@ -47,10 +49,8 @@
 to finalize the update.
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200510-23
-http://bugs.gentoo.org/show_bug.cgi?id=109858
+http://bugs.gentoo.org/show_bug.cgi?id=109858";
 
-Risk factor : Low";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200510-23 (tikiwiki)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200510_23.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200511_12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200511_12.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200511_12.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(55878);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200511-12 (scorched3d)";
  script_name(name);
@@ -47,10 +49,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200511-12
 http://bugs.gentoo.org/show_bug.cgi?id=111421
-http://seclists.org/lists/fulldisclosure/2005/Nov/0079.html
+http://seclists.org/lists/fulldisclosure/2005/Nov/0079.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200511-12 (scorched3d)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200511_12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200612_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200612_02.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200612_02.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57941);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-6172");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200612-02 (xine-lib)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-libs/xine-lib-1.1.2-r3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200612-02
-http://bugs.gentoo.org/show_bug.cgi?id=156645
+http://bugs.gentoo.org/show_bug.cgi?id=156645";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200612-02 (xine-lib)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200612_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200703_24.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200703_24.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200703_24.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58162);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-5864");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200703-24 (mgv)";
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200703-24
 http://bugs.gentoo.org/show_bug.cgi?id=154645
-http://www.gentoo.org/security/en/glsa/glsa-200611-20.xml
+http://www.gentoo.org/security/en/glsa/glsa-200611-20.xml";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200703-24 (mgv)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200703_24.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200710_04.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200710_04.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200710_04.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58652);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-4974");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200710-04 (libsndfile)";
@@ -46,10 +48,8 @@
     # emerge --ask --oneshot --verbose '>=media-libs/libsndfile-1.0.17-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200710-04
-http://bugs.gentoo.org/show_bug.cgi?id=192834
+http://bugs.gentoo.org/show_bug.cgi?id=192834";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200710-04 (libsndfile)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200710_04.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200710_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200710_06.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200710_06.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58654);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-3738", "CVE-2007-3108", "CVE-2007-5135");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200710-06 (openssl)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200710-06
 http://bugs.gentoo.org/show_bug.cgi?id=188799
-http://bugs.gentoo.org/show_bug.cgi?id=194039
+http://bugs.gentoo.org/show_bug.cgi?id=194039";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200710-06 (openssl)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200710_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200802_08.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200802_08.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200802_08.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60385);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-0171", "CVE-2008-0172");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200802-08 (boost)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=dev-libs/boost-1.34.1-r2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200802-08
-http://bugs.gentoo.org/show_bug.cgi?id=205955
+http://bugs.gentoo.org/show_bug.cgi?id=205955";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200802-08 (boost)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200802_08.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200803_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200803_03.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_200803_03.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60506);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-6061");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200803-03 (audacity)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-sound/audacity-1.3.4-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200803-03
-http://bugs.gentoo.org/show_bug.cgi?id=199751
+http://bugs.gentoo.org/show_bug.cgi?id=199751";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200803-03 (audacity)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200803_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201006_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201006_02.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/glsa_201006_02.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -30,10 +30,12 @@
 if(description)
 {
  script_id(69005);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2009-2295", "CVE-2009-2660", "CVE-2009-3296");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
  script_name("Gentoo Security Advisory GLSA 201006-02 (camlimages)");
 
  desc = "The remote host is missing updates announced in
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201006-02
 http://bugs.gentoo.org/show_bug.cgi?id=276235
-http://bugs.gentoo.org/show_bug.cgi?id=290222
+http://bugs.gentoo.org/show_bug.cgi?id=290222";
 
-Risk factor: High";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201006-02 (camlimages)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201006_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/hp_power_manager_mult_remote_code_execution.nasl
===================================================================
--- trunk/openvas-plugins/scripts/hp_power_manager_mult_remote_code_execution.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/hp_power_manager_mult_remote_code_execution.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(100457);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-20 19:30:24 +0100 (Wed, 20 Jan 2010)");
  script_bugtraq_id(37866,37867,37873);
  script_cve_id("CVE-2009-3999","CVE-2009-4000");
- script_version ("1.0-$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
 
@@ -56,10 +58,8 @@
 http://www.securityfocus.com/bid/37873
 http://h18000.www1.hp.com/products/servers/proliantstorage/power-protection/software/power-manager/index.html
 http://h18004.www1.hp.com/products/servers/proliantstorage/power-protection/software/power-manager/dl/HPPM_Windows_Readme4210_Eng.zip
-http://www.securityfocus.com/archive/1/509042
+http://www.securityfocus.com/archive/1/509042";
 
-Risk factor: Critical";
-
  script_description(desc);
  script_summary("Determine if HP Power Manager version is < 4.2.10 ");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/hp_power_manager_mult_remote_code_execution.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/iis_dot_cnf.nasl
===================================================================
--- trunk/openvas-plugins/scripts/iis_dot_cnf.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/iis_dot_cnf.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,9 +28,11 @@
 if(description)
 {
   script_id(10575);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_cve_id("CVE-2002-1717");
   script_bugtraq_id(4078);
-  script_version ("$Revision$");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   
@@ -46,10 +48,8 @@
 See also : http://www.safehack.com/Advisory/IIS5webdir.txt
 Solution: If you do not need .cnf files, then delete them, otherwise use
 suitable access control lists to ensure that the .cnf files are not
-world-readable by Anonymous users.
+world-readable by Anonymous users.";
 
-Risk factor : Medium";
-
   script_description(desc);
   script_summary("Check for existence of world-readable .cnf files");
   script_category(ACT_GATHER_INFO);
@@ -104,10 +104,8 @@
 See also : http://www.safehack.com/Advisory/IIS5webdir.txt
 Solution: If you do not need .cnf files, then delete them, otherwise use
 suitable access control lists to ensure that the .cnf files are not
-world-readable by Anonymous users.
+world-readable by Anonymous users.";
 
-Risk factor : Medium";
-
 	
    	security_warning(port:port, data:data);
 	exit(0);

Modified: trunk/openvas-plugins/scripts/ilohamail_attachment_upload.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ilohamail_attachment_upload.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ilohamail_attachment_upload.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -24,8 +24,10 @@
 
 if (description) {
   script_id(14632);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_bugtraq_id(6740);
-  script_version("$Revision$");
   script_tag(name:"risk_factor", value:"Low");
 
   script_xref(name:"OSVDB", value:"7334");
@@ -48,9 +50,7 @@
 ***** simply by looking at the version number of IlohaMail 
 ***** installed there.
 
-Solution : Upgrade to IlohaMail version 0.7.9 or later.
-
-Risk factor : Low";
+Solution : Upgrade to IlohaMail version 0.7.9 or later.";
   script_description(desc);
  
   summary = "Checks for Attachment Upload vulnerability in IlohaMail";

Modified: trunk/openvas-plugins/scripts/jolt2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/jolt2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/jolt2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(11902);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(1312);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2000-0482");
@@ -44,10 +46,8 @@
 An attacker may use this flaw to shut down this server or router,
 thus preventing you from working properly.
 
-Solution : contact your operating system vendor for a patch.
+Solution : contact your operating system vendor for a patch.";
 
-Risk factor: Medium";
-
  script_description(desc);
  
  summary = "Floods target with incorrectly fragmented packets";

Modified: trunk/openvas-plugins/scripts/mdksa_2009_032.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_032.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/mdksa_2009_032.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63285);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-02 23:28:24 +0100 (Mon, 02 Feb 2009)");
  script_cve_id("CVE-2008-5079", "CVE-2008-5029", "CVE-2008-5300");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.9");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:032 (kernel)";
@@ -71,10 +73,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:032
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:032";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:032 (kernel)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_032.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_098.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_098.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/mdksa_2009_098.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63913);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-05 16:00:35 +0200 (Tue, 05 May 2009)");
  script_cve_id("CVE-2009-0844", "CVE-2009-0846", "CVE-2009-0847", "CVE-2009-0845");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Mandrake Security Advisory MDVSA-2009:098 (krb5)";
@@ -72,10 +74,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:098
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:098";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:098 (krb5)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_098.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_158_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_158_2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/mdksa_2009_158_2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66288);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-23 20:51:51 +0100 (Mon, 23 Nov 2009)");
  script_cve_id("CVE-2009-1194");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandriva Security Advisory MDVSA-2009:158-2 (pango)");
@@ -56,10 +58,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:158-2
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:158-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:158-2 (pango)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_158_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64842);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-15 22:46:32 +0200 (Tue, 15 Sep 2009)");
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2404");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandrake Security Advisory MDVSA-2009:197-2 (nss)");
@@ -57,10 +59,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:197-2
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:197-2";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:197-2 (nss)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_197_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_263.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_263.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/mdksa_2009_263.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66019);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)");
  script_cve_id("CVE-2008-4476");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  script_name("Mandrake Security Advisory MDVSA-2009:263 (sympa)");
@@ -52,10 +54,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:263
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:263";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:263 (sympa)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_263.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_290_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_290_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/mdksa_2009_290_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66374);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2009-0689", "CVE-2009-3380", "CVE-2009-3274", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3373", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-3374", "CVE-2009-3376");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandriva Security Advisory MDVSA-2009:290-1 (firefox)");
@@ -52,10 +54,8 @@
 of md5 checksums and GPG signatures is performed automatically for you.
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:290-1
-http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.15
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.15";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:290-1 (firefox)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_290_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_299.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_299.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/mdksa_2009_299.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66247);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)");
  script_cve_id("CVE-2009-1274", "CVE-2009-0385", "CVE-2009-0698");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandriva Security Advisory MDVSA-2009:299 (xine-lib)");
@@ -59,10 +61,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:299
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:299";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:299 (xine-lib)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_299.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/myserver_traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/myserver_traversal.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/myserver_traversal.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -25,7 +25,9 @@
 if(description)
 {
  script_id(11851);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"High");
 
  name = "myServer 0.4.3 / 0.7 Directory Traversal Vulnerability";
@@ -47,8 +49,7 @@
 
 More information : http://www.securityfocus.com/archive/1/339145
 
-Solution : Upgrade to myServer 0.7.1 or later
-Risk factor : High";
+Solution : Upgrade to myServer 0.7.1 or later";
 
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/nanocms_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/nanocms_detect.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/nanocms_detect.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -31,14 +31,14 @@
   This host is running NanoCMS, a content management system.
 
  See also:
-  http://nanocms.in
+  http://nanocms.in";
 
- Risk factor : None";
-
 if (description)
 {
  script_id(100140);
- script_version ("1.0");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-16 19:20:22 +0200 (Thu, 16 Apr 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("NanoCMS Detection");  


Property changes on: trunk/openvas-plugins/scripts/nanocms_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/novell_groupwise_webacc_information_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/novell_groupwise_webacc_information_disclosure.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/novell_groupwise_webacc_information_disclosure.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,9 +29,11 @@
 if(description)
 {
  script_id(10789); 
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2001-1458");
  script_bugtraq_id(3436);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
 

Modified: trunk/openvas-plugins/scripts/openssh_afs.nasl
===================================================================
--- trunk/openvas-plugins/scripts/openssh_afs.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/openssh_afs.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -25,9 +25,11 @@
 if(description)
 {
  script_id(10954);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(4560);
  script_cve_id("CVE-2002-0575");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  
@@ -47,9 +49,7 @@
 root exploit.
 
 Solution :
-Upgrade to the latest version of OpenSSH
-
-Risk factor : High";
+Upgrade to the latest version of OpenSSH";
 	
 	
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0457.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0457.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0457.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(64014);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-20 00:17:15 +0200 (Wed, 20 May 2009)");
  script_cve_id("CVE-2009-1364");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0457 (libwmf)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0457
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0457
-https://rhn.redhat.com/errata/RHSA-2009-0457.html
+https://rhn.redhat.com/errata/RHSA-2009-0457.html";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:0457 (libwmf)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_0457.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1116.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1116.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1116.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(64271);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-23 15:49:15 +0200 (Tue, 23 Jun 2009)");
  script_cve_id("CVE-2009-0688");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1116
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1116
-https://rhn.redhat.com/errata/RHSA-2009-1116.html
+https://rhn.redhat.com/errata/RHSA-2009-1116.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1116.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/owa-anonymous.nasl
===================================================================
--- trunk/openvas-plugins/scripts/owa-anonymous.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/owa-anonymous.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(10781);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(3301);
  script_cve_id("CVE-2001-0660");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  
@@ -72,10 +74,8 @@
 	4. Select the Folder Shortcuts tab.
 	5. Remove all folders which are allowed anonymous viewing.
         6. Choose OK.
-	7. Remove the anonymous access from the login web pages.
+	7. Remove the anonymous access from the login web pages.";
 	
-Risk factor : Medium";	
-	
  script_description(desc);
  
  summary = "Outlook Web anonymous access";

Modified: trunk/openvas-plugins/scripts/php_split_mime.nasl
===================================================================
--- trunk/openvas-plugins/scripts/php_split_mime.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/php_split_mime.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,9 +26,11 @@
 if(description)
 {
  script_id(10867);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(4183);
  script_cve_id("CVE-2002-0081");
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  
@@ -44,8 +46,7 @@
 multipart/form-data POST requests, any one of which can
 allow an attacker to gain remote access to the system.
 
-Solution : Upgrade to PHP 4.1.2
-Risk factor : High";
+Solution : Upgrade to PHP 4.1.2";
 
 
 

Modified: trunk/openvas-plugins/scripts/phpadsnew_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpadsnew_xss.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/phpadsnew_xss.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -33,6 +33,8 @@
 {
  script_id(17335);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2005-0791");
  script_bugtraq_id(12803);
  script_tag(name:"cvss_base", value:"4.3");
@@ -54,10 +56,8 @@
  * Cross Site Scripting
 
 An attacker may use the cross site scripting bug to preform phishing
-attacks.
+attacks.";
 
-Risk factor: Medium";
-
  script_description(desc);
  
  summary = "Checks for the presence of a XSS in phpAdsNew";

Modified: trunk/openvas-plugins/scripts/scripteen_multiple.nasl
===================================================================
--- trunk/openvas-plugins/scripts/scripteen_multiple.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/scripteen_multiple.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100246);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-26 19:54:54 +0200 (Sun, 26 Jul 2009)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2009-2892");
  script_bugtraq_id(35800,35801);
- script_version ("1.0");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("Scripteen Free Image Hosting Script Multiple Vulnerabilities");
@@ -52,11 +54,8 @@
 References:
 http://www.securityfocus.com/bid/35800
 http://www.securityfocus.com/bid/35801
-http://www.scripteen.com/scripts/scripteen-free-image-hosting-script.html#more-10
+http://www.scripteen.com/scripts/scripteen-free-image-hosting-script.html#more-10";
 
-
-Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if Scripteen Free Image Hosting Script is prone to multiple Vulnerabilities");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/scripteen_multiple.nasl
___________________________________________________________________
Name: svn:keywords
   - ID
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_atlassian_jira_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_atlassian_jira_detect.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_atlassian_jira_detect.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_atlassian_jira_detect.nasl 8538 2010-04-27 15:20:36Z apr $
+# $Id$
 #
 # Atlassian JIRA Version Detection
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902046);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-30 15:20:35 +0200 (Fri, 30 Apr 2010)");
   script_name("Atlassian JIRA Version Detection");
   desc = "
   Overview: This script finds the installed Atlassian JIRA version and saves


Property changes on: trunk/openvas-plugins/scripts/secpod_atlassian_jira_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_audacity_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_audacity_bof_vuln_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_audacity_bof_vuln_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_audacity_bof_vuln_win.nasl 1000 2009-02-12 18:50:24Z feb $
+# $Id$
 #
 # Audacity Buffer Overflow Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900305);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-18 15:32:11 +0100 (Wed, 18 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0490");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.3
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.3";
 
   script_description(desc);
   script_summary("Check for the Version of Audacity");


Property changes on: trunk/openvas-plugins/scripts/secpod_audacity_bof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_firefox_dos_vuln_sep09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_dos_vuln_sep09_lin.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_firefox_dos_vuln_sep09_lin.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_firefox_dos_vuln_sep09_lin.nasl 4684 2009-09-11 14:53:33Z sep $
+# $Id$
 #
 # Mozilla Firefox Denial Of Service Vulnerability - Sep09 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900850);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-11 18:01:06 +0200 (Fri, 11 Sep 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-3069", "CVE-2009-3073");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.0
-  Risk factor: High";
+    CVSS Temporal Score : 5.0";
 
   script_description(desc);
   script_summary("Check for the version of Firefox");


Property changes on: trunk/openvas-plugins/scripts/secpod_firefox_dos_vuln_sep09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_google_chrome_getsvgdocument_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_google_chrome_getsvgdocument_xss_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_google_chrome_getsvgdocument_xss_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_google_chrome_getsvgdocument_xss_vuln.nasl 4892 2009-09-22 17:45:29Z sep $
+# $Id$
 #
 # Google Chrome 'getSVGDocument' Cross-Site Scripting Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900860);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-23 08:37:26 +0200 (Wed, 23 Sep 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-3264");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:P/A:N)
-    CVSS Temporal Score : 3.2
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.2";
 
   script_description(desc);
   script_summary("Check for the version of Google Chrome");


Property changes on: trunk/openvas-plugins/scripts/secpod_google_chrome_getsvgdocument_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln_may10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln_may10.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln_may10.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_hp_openview_nnm_mult_vuln_may10.nasl 9035 2010-05-27 18:11:03Z may $
+# $Id$
 #
 # HP OpenView Network Node Manager Multiple Vulnerabilities - May10
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900243);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-01 15:40:11 +0200 (Tue, 01 Jun 2010)");
   script_bugtraq_id(40065, 40067);
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");


Property changes on: trunk/openvas-plugins/scripts/secpod_hp_openview_nnm_mult_vuln_may10.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ibm_db2_repeat_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_db2_repeat_bof_vuln_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_ibm_db2_repeat_bof_vuln_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ibm_db2_repeat_bof_vuln_win.nasl 8674 2010-04-29 21:11:27Z apr $
+# $Id$
 #
 # IBM DB2 REPEAT Buffer Overflow and TLS Renegotiation Vulnerabilities (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902175);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-30 15:20:35 +0200 (Fri, 30 Apr 2010)");
   script_cve_id("CVE-2010-1560");
   script_name("IBM DB2 REPEAT Buffer Overflow and TLS Renegotiation Vulnerabilities (Win)");
   script_tag(name:"cvss_base", value:"4.0");


Property changes on: trunk/openvas-plugins/scripts/secpod_ibm_db2_repeat_bof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_mantis_mult_lfi_n_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mantis_mult_lfi_n_xss_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_mantis_mult_lfi_n_xss_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_mantis_mult_lfi_n_xss_vuln.nasl 17341 2011-09-30 12:12:12 sep $
+# $Id$
 #
 # MantisBT Multiple Local File Include and Cross Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902573);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-30 15:58:03 +0200 (Fri, 30 Sep 2011)");
   script_bugtraq_id(49448);
   script_cve_id("CVE-2011-3356", "CVE-2011-3357", "CVE-2011-3358", "CVE-2011-3578");
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_mantis_mult_lfi_n_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_metaserver_rt_multiple_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_metaserver_rt_multiple_dos_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_metaserver_rt_multiple_dos_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_metaserver_rt_multiple_dos_vuln.nasl 17305 2011-09-21 15:15:15Z sep $
+# $Id$
 #
 # MetaServer RT Multiple Remote Denial of Service Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902569);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-22 10:24:03 +0200 (Thu, 22 Sep 2011)");
   script_bugtraq_id(49696);
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");


Property changes on: trunk/openvas-plugins/scripts/secpod_metaserver_rt_multiple_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_mikmod_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mikmod_dos_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_mikmod_dos_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900443);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-29 15:16:47 +0100 (Thu, 29 Jan 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-0179");
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.2
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.2";
 
   script_description(desc);
   script_summary("Check for the version of MikMod Player");


Property changes on: trunk/openvas-plugins/scripts/secpod_mikmod_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms08-074.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-074.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_ms08-074.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms08-074.nasl 641 2008-12-10 15:21:05Z dec $
+# $Id$
 #
 # Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
 #
@@ -29,7 +29,9 @@
 if(description)
 {
   script_id(900061);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-10 17:58:14 +0100 (Wed, 10 Dec 2008)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-4264", "CVE-2008-4265", "CVE-2008-4266");
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the vulnerable File Version");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms08-074.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms10-038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-038.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_ms10-038.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms10-038.nasl 9457 2010-06-09 12:12:09Z jun $
+# $Id$
 #
 # Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902068);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-09 17:19:57 +0200 (Wed, 09 Jun 2010)");
   script_cve_id("CVE-2010-0821", "CVE-2010-0822", "CVE-2010-0823", "CVE-2010-0824",
                 "CVE-2010-1246", "CVE-2010-1245", "CVE-2010-1247", "CVE-2010-1249",
                 "CVE-2010-1248", "CVE-2010-1250", "CVE-2010-1251", "CVE-2010-1252",


Property changes on: trunk/openvas-plugins/scripts/secpod_ms10-038.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms11-038.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-038.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_ms11-038.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms11-038.nasl 15629 2011-06-15 08:11:11Z jun $
+# $Id$
 #
 # Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902377);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-15 15:55:00 +0200 (Wed, 15 Jun 2011)");
   script_cve_id("CVE-2011-0658");
   script_bugtraq_id(48174);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-038.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl 4912 2009-09-24 14:54:24Z sep $
+# $Id$
 #
 # Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
 #
@@ -28,6 +28,8 @@
 {
   script_id(900957);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-29 09:16:03 +0200 (Tue, 29 Sep 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-3275");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.7
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.7";
 
   script_description(desc);
   script_summary("Check for the version of Micosoft Windows Patterns & Practices EntLib");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms_wpp_enterprise_library_re_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_bof_vuln_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_bof_vuln_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_novell_iprint_client_mult_bof_vuln_win.nasl 6124 2009-12-18 18:20:51Z dec $
+# $Id$
 #
 # Novell iPrint Client Multiple BOF Vulnerabilities (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900729);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-21 07:14:17 +0100 (Mon, 21 Dec 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-1569", "CVE-2009-1568");
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Novell iPrint Client");


Property changes on: trunk/openvas-plugins/scripts/secpod_novell_iprint_client_mult_bof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_oracle_http_server_xss_header_injection_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_oracle_http_server_xss_header_injection_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_oracle_http_server_xss_header_injection_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_oracle_http_server_xss_header_injection_vuln.nasl 15628 2011-06-22 14:14:14Z jun $
+# $Id$
 #
 # Oracle HTTP Server 'Expect' Header Cross-Site Scripting Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902526);
-  script_version("$Revision$: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-24 16:31:03 +0200 (Fri, 24 Jun 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Oracle HTTP Server 'Expect' Header Cross-Site Scripting Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/secpod_oracle_http_server_xss_header_injection_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -27,10 +27,12 @@
 if(description)
 {
  script_id(900015);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-08-22 10:29:01 +0200 (Fri, 22 Aug 2008)");
  script_bugtraq_id(30370);
  script_cve_id("CVE-2007-5400");
  script_copyright("Copyright (C) 2008 SecPod");
- script_version("$Revision: 1.1 $");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_category(ACT_GATHER_INFO);
@@ -61,8 +63,7 @@
 
  CVSS Score :
         CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-        CVSS Temporal Score : 5.0
- Risk factor : Critical";
+        CVSS Temporal Score : 5.0";
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/WindowsVersion");


Property changes on: trunk/openvas-plugins/scripts/secpod_realplayer_swf_bof_vuln_900015.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_realvnc_remote_code_exe_vuln_win_900162.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realvnc_remote_code_exe_vuln_win_900162.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_realvnc_remote_code_exe_vuln_win_900162.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,10 +26,12 @@
 if(description)
 {
   script_id(900162);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-29 14:53:11 +0100 (Wed, 29 Oct 2008)");
   script_cve_id("CVE-2008-4770");
  script_bugtraq_id(31832);
   script_copyright("Copyright (C) 2008 SecPod");
-  script_version("Revision: 1.0 ");
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");
   script_category(ACT_GATHER_INFO);
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.0 (AV:N/AC:M/Au:SI/C:P/I:P/A:P)
-    CVSS Temporal Score : 4.4
-  Risk factor: High";
+    CVSS Temporal Score : 4.4";
 
   script_description(desc);
   script_dependencies("secpod_reg_enum.nasl", "find_service.nes");


Property changes on: trunk/openvas-plugins/scripts/secpod_realvnc_remote_code_exe_vuln_win_900162.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_squirrelmail_cmd_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_squirrelmail_cmd_exec_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_squirrelmail_cmd_exec_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_squirrelmail_cmd_exec_vuln.nasl 2476 2009-05-26 17:48:29Z may $
+# $Id$
 #
 # SquirrelMail Command Execution Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900713);
-  script_version("$Revision: 1.1 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-29 07:35:11 +0200 (Fri, 29 May 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-1381");
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.0
-  Risk factor: High";
+    CVSS Temporal Score : 5.0";
 
   script_description(desc);
   script_summary("Check for the version of SquirrelMail");


Property changes on: trunk/openvas-plugins/scripts/secpod_squirrelmail_cmd_exec_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_strongswan_n_openswan_dos_vuln_jun09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_strongswan_n_openswan_dos_vuln_jun09.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_strongswan_n_openswan_dos_vuln_jun09.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_strongswan_n_openswan_dos_vuln_jun09.nasl 3120 2009-06-30 20:34:33Z jun $
+# $Id$
 #
 # StrongSwan/Openswan Denial Of Service Vulnerability June-09
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900386);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-30 16:55:49 +0200 (Tue, 30 Jun 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-2185");
@@ -65,8 +67,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.7
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.7";
 
   script_description(desc);
   script_summary("Check for the version of strongSwan/Openswan");


Property changes on: trunk/openvas-plugins/scripts/secpod_strongswan_n_openswan_dos_vuln_jun09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_sun_java_se_mult_vuln_nov09_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_sun_java_se_mult_vuln_nov09_win.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_sun_java_se_mult_vuln_nov09_win.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_sun_java_se_mult_vuln_nov09_win.nasl 5700 2009-11-20 12:03:58Z nov $
+# $Id$
 #
 # Sun Java SE Multiple Vulnerabilities - Nov09 (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900978);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-11-23 07:01:19 +0100 (Mon, 23 Nov 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-3728", "CVE-2009-3729", "CVE-2009-3864", "CVE-2009-3879",
@@ -80,8 +82,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.5
-  Risk factor: High";
+    CVSS Temporal Score : 5.5";
 
   script_description(desc);
   script_summary("Check for the version of Sun Java JRE");


Property changes on: trunk/openvas-plugins/scripts/secpod_sun_java_se_mult_vuln_nov09_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_vlc_media_player_bof_vuln_feb11_lin.nasl 13610 2011-02-21 16:13:17 feb $
+# $Id$
 #
 # VLC Media Player USF and Text Subtitles Decoders BOF Vulnerabilities (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902342);
-  script_version("$Revision:1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-23 12:24:37 +0100 (Wed, 23 Feb 2011)");
   script_cve_id("CVE-2011-0522");
   script_bugtraq_id(46008);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_vlc_media_player_bof_vuln_feb11_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_wintftp_server_dir_trav_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wintftp_server_dir_trav_vuln.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/secpod_wintftp_server_dir_trav_vuln.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_wintftp_server_dir_trav_vuln.nasl 2010-11-29 14:50:29Z dec $
+# $Id$
 #
 # WinTFTP Server Pro Remote Directory Traversal Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902271);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-09 06:49:11 +0100 (Thu, 09 Dec 2010)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_name("WinTFTP Server Pro Remote Directory Traversal Vulnerability");


Property changes on: trunk/openvas-plugins/scripts/secpod_wintftp_server_dir_trav_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sendcard_sql.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sendcard_sql.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sendcard_sql.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -24,10 +24,12 @@
 
 if (description) {
   script_id(19748);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
   script_cve_id("CVE-2005-2404");
   script_bugtraq_id(14351);
   script_xref(name:"OSVDB", value:"18153");
-  script_version("$Revision$");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
 
@@ -42,8 +44,7 @@
 injection attack due to its failure to sanitize user-supplied input to
 the 'id' field in the 'sendcard.php' script. 
 
-Solution : Unknown at this time
-Risk factor: High";
+Solution : Unknown at this time";
 
   script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65815);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2008-4314");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for Samba");
@@ -58,10 +60,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for Samba");


Property changes on: trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_cups2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles10_cups2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65880);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2009-0791", "CVE-2009-0949");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for CUPS");
@@ -51,10 +53,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for CUPS");


Property changes on: trunk/openvas-plugins/scripts/sles10_cups2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_clamav1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_clamav1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles11_clamav1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,7 +29,9 @@
 if(description)
 {
  script_id(65680);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for ClamAV");
 
@@ -47,10 +49,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for ClamAV");


Property changes on: trunk/openvas-plugins/scripts/sles11_clamav1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_libapr-util1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_libapr-util1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles11_libapr-util1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65691);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-1955", "CVE-2009-1956", "CVE-2009-0023");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for libapr-util1");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for libapr-util1");


Property changes on: trunk/openvas-plugins/scripts/sles11_libapr-util1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_libvolume_id1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_libvolume_id1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles11_libvolume_id1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65648);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-1185");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for udev");
@@ -51,10 +53,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for udev");


Property changes on: trunk/openvas-plugins/scripts/sles11_libvolume_id1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_xerces-j2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_xerces-j2.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles11_xerces-j2.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65711);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-2625");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for Xerces-j2");
@@ -52,10 +54,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for Xerces-j2");


Property changes on: trunk/openvas-plugins/scripts/sles11_xerces-j2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5009300.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009300.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5009300.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65146);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-0906", "CVE-2007-0907", "CVE-2007-0908", "CVE-2007-0909", "CVE-2007-0910", "CVE-2007-0911", "CVE-2006-6383");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for PHP4");
@@ -65,10 +67,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for PHP4");


Property changes on: trunk/openvas-plugins/scripts/sles9p5009300.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5012769.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012769.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5012769.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65055);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for kdelibs3");
 
@@ -46,10 +48,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for kdelibs3");


Property changes on: trunk/openvas-plugins/scripts/sles9p5012769.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5012976.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012976.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5012976.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65213);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2006-4334", "CVE-2006-4335", "CVE-2006-4336", "CVE-2006-4337", "CVE-2006-4338");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for gzip");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for gzip");


Property changes on: trunk/openvas-plugins/scripts/sles9p5012976.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5013049.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013049.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5013049.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65382);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2004-1029");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for Java2");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Java2");


Property changes on: trunk/openvas-plugins/scripts/sles9p5013049.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5016198.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5016198.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5016198.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65468);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for bind");
 
@@ -47,10 +49,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for bind");


Property changes on: trunk/openvas-plugins/scripts/sles9p5016198.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5020045.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020045.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5020045.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65521);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2006-3459", "CVE-2006-3460", "CVE-2006-3461", "CVE-2006-3462", "CVE-2006-3463", "CVE-2006-3464", "CVE-2006-3465");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for libtiff");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for libtiff");


Property changes on: trunk/openvas-plugins/scripts/sles9p5020045.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5020679.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020679.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5020679.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65357);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-1127");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for perl-Net-Server");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for perl-Net-Server");


Property changes on: trunk/openvas-plugins/scripts/sles9p5020679.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5043440.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5043440.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5043440.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65380);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2009-0040");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for libpng");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for libpng");


Property changes on: trunk/openvas-plugins/scripts/sles9p5043440.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5043892.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5043892.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/sles9p5043892.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65210);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2009-0037");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for curl");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for curl");


Property changes on: trunk/openvas-plugins/scripts/sles9p5043892.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/squid_rdos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/squid_rdos.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/squid_rdos.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,9 +29,11 @@
 if(description)
 {
   script_id(15463);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_bugtraq_id(11385);
   script_cve_id("CVE-2004-0918");
-  script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
   script_name("Squid remote denial of service");
@@ -41,8 +43,7 @@
   This flaw is caused due to an input validation error in the SNMP module.
   An attacker can exploit this flaw to crash the server with a specially
   crafted UDP packet.
-  Solution : Upgrade to squid 2.5.STABLE7 or newer
-  Risk factor: Medium";
+  Solution : Upgrade to squid 2.5.STABLE7 or newer";
  
   script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/ssh_proto_version.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ssh_proto_version.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ssh_proto_version.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -29,14 +29,14 @@
 desc = "
 
 Overview:
-The remote SSH Server supports the following SSH Protocol Versions:
+The remote SSH Server supports the following SSH Protocol Versions:";
 
-Risk factor : None";
-
 if (description)
 {
  script_id(100259);
- script_version ("1.0");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-25 21:06:41 +0200 (Tue, 25 Aug 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("SSH Protocol Versions Supported");


Property changes on: trunk/openvas-plugins/scripts/ssh_proto_version.nasl
___________________________________________________________________
Name: svn:keywords
   - ID
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/subversion_1_0_6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/subversion_1_0_6.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/subversion_1_0_6.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,9 +28,11 @@
 if(description)
 {
  script_id(13848);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2004-1438");
  script_bugtraq_id(10800);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  script_xref(name:"OSVDB", value:"8239");
@@ -45,8 +47,7 @@
 An attacker can access to any file in a given subversion repository,
 no matter what restrictions have been set by the administrator.
 
-Solution : Upgrade to subversion 1.0.6 or newer.
-Risk factor : Medium";
+Solution : Upgrade to subversion 1.0.6 or newer.";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63891);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-28 20:40:12 +0200 (Tue, 28 Apr 2009)");
  script_cve_id("CVE-2008-4311", "CVE-2008-4989", "CVE-2009-0193", "CVE-2009-0196", "CVE-2009-0365", "CVE-2009-0578", "CVE-2009-0586", "CVE-2009-0658", "CVE-2009-0698", "CVE-2009-0790", "CVE-2009-0792", "CVE-2009-0922", "CVE-2009-0927", "CVE-2009-0928", "CVE-2009-1061", "CVE-2009-1062", "CVE-2009-1171", "CVE-2009-1241");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "SuSE Security Summary SUSE-SR:2009:009";
@@ -44,10 +46,8 @@
 
 Solution:
 
-Update all out of date packages.
+Update all out of date packages.";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "SuSE Security Advisory SUSE-SR:2009:009";


Property changes on: trunk/openvas-plugins/scripts/suse_sr_2009_009.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/taifajobs_1_0_jobid_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/taifajobs_1_0_jobid_sql_injection.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/taifajobs_1_0_jobid_sql_injection.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id:$
+# $Id$
 #
 # Taifajobs SQL-Injection Detection
 #
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100002);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-26 04:52:45 +0100 (Thu, 26 Feb 2009)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2009-0727");
  script_bugtraq_id(33864);
- script_version ("1.0");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("Taifajobs SQL Injection Vulnerability");
@@ -48,9 +50,7 @@
   for further informations. 
  
  Impact:
-  Successful exploitation allows attacker retrieving users email,loginname and md5 hash password.
-  
- Risk factor: High";
+  Successful exploitation allows attacker retrieving users email,loginname and md5 hash password.";
 
  script_description(desc);
  script_summary("Determine if Taifajobs vulnerable to SQL Injection");


Property changes on: trunk/openvas-plugins/scripts/taifajobs_1_0_jobid_sql_injection.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/tftp_files_hp_ignite_ux.nasl
===================================================================
--- trunk/openvas-plugins/scripts/tftp_files_hp_ignite_ux.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/tftp_files_hp_ignite_ux.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,7 +28,9 @@
 if(description)
 {
 	script_id(19508);
-	script_version ("$Revision$");
+	script_version("$Revision$");
+	script_tag(name:"last_modification", value:"$Date$");
+	script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
     script_tag(name:"risk_factor", value:"Medium");
 	name="TFTP file detection (HP Ignite-UX)";
 	script_name(name);
@@ -41,8 +43,7 @@
 scrutiny.
 
 Solution: If it is not required, disable or uninstall the TFTP server. 
-Otherwise restrict access to trusted sources only.
-Risk factor: Medium";
+Otherwise restrict access to trusted sources only.";
 	script_description(desc);
 	summary="Determines if the remote host has sensitive files exposed via TFTP (HP Ignite-UX)";
 	script_summary(summary);

Modified: trunk/openvas-plugins/scripts/ubuntu_771_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_771_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ubuntu_771_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64172);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2009-1438", "CVE-2009-1513", "CVE-2009-0757", "CVE-2009-1194", "CVE-2009-1364", "CVE-2009-0719", "CVE-2009-0652", "CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1306", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-1572", "CVE-2009-1482", "CVE-2008-0068", "CVE-2008-1697", "CVE-2008-0928", "CVE-2008-4539", "CVE-2008-1945", "CVE-2009-1464", "CVE-2009-1465", "CVE-2009-1466", "CVE-2009-0042", "CVE-2009-1131", "CVE-2009-0556", "CVE-2009-1130", "CVE-2009-0227", "CVE-2009-0223", "CVE-2009-0220", "CVE-2009-1128");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Ubuntu USN-771-1 (libmodplug)";
@@ -72,10 +74,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-771-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-771-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Ubuntu USN-771-1 (libmodplug)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_771_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_787_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_787_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ubuntu_787_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64201);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-15 19:20:43 +0200 (Mon, 15 Jun 2009)");
  script_cve_id("CVE-2009-0023", "CVE-2009-1191", "CVE-2009-1195", "CVE-2009-1955", "CVE-2009-1956");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-787-1 (apache2)";
@@ -102,10 +104,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-787-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-787-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Ubuntu USN-787-1 (apache2)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_787_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_796_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_796_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ubuntu_796_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64382);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-15 04:21:35 +0200 (Wed, 15 Jul 2009)");
  script_cve_id("CVE-2009-1889");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Ubuntu USN-796-1 (pidgin)";
@@ -60,10 +62,8 @@
 After a standard system upgrade you need to restart Pidgin to effect
 the necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-796-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-796-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Ubuntu USN-796-1 (pidgin)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_796_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_811_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_811_1.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/ubuntu_811_1.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64575);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2654");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Ubuntu USN-811-1 (xulrunner-1.9)");
@@ -67,10 +69,8 @@
 applications that use xulrunner, such as Epiphany, to effect the necessary
 changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-811-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-811-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Ubuntu USN-811-1 (xulrunner-1.9)");


Property changes on: trunk/openvas-plugins/scripts/ubuntu_811_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/upnp_xp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/upnp_xp.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/upnp_xp.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(10829);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(3723);
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2001-0876");
@@ -38,8 +40,7 @@
 different reasons.  
 
 
-Solution: To disable UPNP, see http://grc.com/UnPnP/UnPnP.htm
-Risk factor : High";
+Solution: To disable UPNP, see http://grc.com/UnPnP/UnPnP.htm";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/win_CVE-2008-0080.nasl
===================================================================
--- trunk/openvas-plugins/scripts/win_CVE-2008-0080.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/win_CVE-2008-0080.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -31,7 +31,9 @@
 if(description)
 {
   script_id(90015);
-  script_version ("$Revision$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-06-17 20:22:38 +0200 (Tue, 17 Jun 2008)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-0080");
@@ -60,10 +62,8 @@
   Solution:
   Run Windows Update and update the listed hotfixes or download and
   update mentioned hotfixes in the advisory from the below link,
-  http://www.microsoft.com/technet/security/bulletin/ms08-007.mspx
+  http://www.microsoft.com/technet/security/bulletin/ms08-007.mspx";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Mini-Redirector Heap Overflow Vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/win_CVE-2008-0080.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/wu_ftpd_rnfr_file_overwrite.nasl
===================================================================
--- trunk/openvas-plugins/scripts/wu_ftpd_rnfr_file_overwrite.nasl	2011-11-04 15:26:51 UTC (rev 11993)
+++ trunk/openvas-plugins/scripts/wu_ftpd_rnfr_file_overwrite.nasl	2011-11-04 15:35:09 UTC (rev 11994)
@@ -26,9 +26,11 @@
 if(description)
 {
  script_id(14302);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-1999-0081");
  script_xref(name:"OSVDB", value:"8717");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
 
@@ -49,9 +51,7 @@
 *** to issue this warning, so it may be a false positive.
 
 
-Solution : Upgrade to Wu-FTPd 2.4.2 or newer
-
-Risk factor: Medium";
+Solution : Upgrade to Wu-FTPd 2.4.2 or newer";
 		
  script_description(desc);
 		    



More information about the Openvas-commits mailing list