[Openvas-commits] r12068 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Nov 9 16:18:55 CET 2011


Author: hdoreau
Date: 2011-11-09 16:17:13 +0100 (Wed, 09 Nov 2011)
New Revision: 12068

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/DDI_JRun_Traversal.nasl
   trunk/openvas-plugins/scripts/JM_Fluxay.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1136.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1189.nasl
   trunk/openvas-plugins/scripts/TYPSoft_ftp_server_34901.nasl
   trunk/openvas-plugins/scripts/account_db2inst1_ibmdb2.nasl
   trunk/openvas-plugins/scripts/cerberus_ftp_36134.nasl
   trunk/openvas-plugins/scripts/cgicso_command_execution.nasl
   trunk/openvas-plugins/scripts/chora_detect.nasl
   trunk/openvas-plugins/scripts/dcshop_information_disclosure.nasl
   trunk/openvas-plugins/scripts/deb_010_1.nasl
   trunk/openvas-plugins/scripts/deb_065_1.nasl
   trunk/openvas-plugins/scripts/deb_078_1.nasl
   trunk/openvas-plugins/scripts/deb_1148_1.nasl
   trunk/openvas-plugins/scripts/deb_1201_1.nasl
   trunk/openvas-plugins/scripts/deb_1313_1.nasl
   trunk/openvas-plugins/scripts/deb_1417_1.nasl
   trunk/openvas-plugins/scripts/deb_1440_1.nasl
   trunk/openvas-plugins/scripts/deb_1486_1.nasl
   trunk/openvas-plugins/scripts/deb_1550_1.nasl
   trunk/openvas-plugins/scripts/deb_1573_1.nasl
   trunk/openvas-plugins/scripts/deb_1609_1.nasl
   trunk/openvas-plugins/scripts/deb_1625_1.nasl
   trunk/openvas-plugins/scripts/deb_1748_1.nasl
   trunk/openvas-plugins/scripts/deb_1888_1.nasl
   trunk/openvas-plugins/scripts/deb_1981_1.nasl
   trunk/openvas-plugins/scripts/deb_2062_1.nasl
   trunk/openvas-plugins/scripts/deb_2219_1.nasl
   trunk/openvas-plugins/scripts/deb_2231_1.nasl
   trunk/openvas-plugins/scripts/deb_2244_1.nasl
   trunk/openvas-plugins/scripts/deb_280_1.nasl
   trunk/openvas-plugins/scripts/deb_303_1.nasl
   trunk/openvas-plugins/scripts/deb_434_1.nasl
   trunk/openvas-plugins/scripts/deb_563_1.nasl
   trunk/openvas-plugins/scripts/deb_577_1.nasl
   trunk/openvas-plugins/scripts/deb_643_1.nasl
   trunk/openvas-plugins/scripts/deb_689_1.nasl
   trunk/openvas-plugins/scripts/deb_730_1.nasl
   trunk/openvas-plugins/scripts/deb_766_1.nasl
   trunk/openvas-plugins/scripts/deb_827_1.nasl
   trunk/openvas-plugins/scripts/deb_848_1.nasl
   trunk/openvas-plugins/scripts/deb_967_1.nasl
   trunk/openvas-plugins/scripts/deb_991_1.nasl
   trunk/openvas-plugins/scripts/fcore_2008_11736.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10718.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1343.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1523.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3433.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4875.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5568.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5773.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8477.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8487.nasl
   trunk/openvas-plugins/scripts/fcore_2009_8611.nasl
   trunk/openvas-plugins/scripts/freebsd_bind98.nasl
   trunk/openvas-plugins/scripts/freebsd_bugzilla10.nasl
   trunk/openvas-plugins/scripts/freebsd_cups-base0.nasl
   trunk/openvas-plugins/scripts/freebsd_curl3.nasl
   trunk/openvas-plugins/scripts/freebsd_dojo.nasl
   trunk/openvas-plugins/scripts/freebsd_drupal50.nasl
   trunk/openvas-plugins/scripts/freebsd_ffmpeg.nasl
   trunk/openvas-plugins/scripts/freebsd_freeradius1.nasl
   trunk/openvas-plugins/scripts/freebsd_gd0.nasl
   trunk/openvas-plugins/scripts/freebsd_gnupg6.nasl
   trunk/openvas-plugins/scripts/freebsd_gnutls5.nasl
   trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl
   trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin5.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-gdk-pixbuf.nasl
   trunk/openvas-plugins/scripts/freebsd_mod_python0.nasl
   trunk/openvas-plugins/scripts/freebsd_openoffice.org0.nasl
   trunk/openvas-plugins/scripts/freebsd_pam_smb.nasl
   trunk/openvas-plugins/scripts/freebsd_pcre1.nasl
   trunk/openvas-plugins/scripts/freebsd_peercast.nasl
   trunk/openvas-plugins/scripts/freebsd_php54.nasl
   trunk/openvas-plugins/scripts/freebsd_postnuke.nasl
   trunk/openvas-plugins/scripts/freebsd_rxvt-unicode0.nasl
   trunk/openvas-plugins/scripts/freebsd_squid0.nasl
   trunk/openvas-plugins/scripts/freebsd_squid12.nasl
   trunk/openvas-plugins/scripts/freebsd_suphp.nasl
   trunk/openvas-plugins/scripts/freebsd_tcpdump2.nasl
   trunk/openvas-plugins/scripts/freebsd_webcalendar.nasl
   trunk/openvas-plugins/scripts/freebsdsa_ntpd.nasl
   trunk/openvas-plugins/scripts/ftpglob.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0059_libsmi_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0176_openoffice.org_centos3_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0516_evolution_centos3_x86_64.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0965-01_lynx_centos2_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0431_kdegraphics_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0437_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_1061_freetype_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0153_thunderbird_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0578_freetype_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0977_openssl_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_0477_gstreamer-plugins_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_PhreeBooks_detect.nasl
   trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0059-01_wireshark.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2008_0863-01_libtiff.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0061-02_gzip.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0678-01_rpm.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0792-01_kernel.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1220-01_samba3x.nasl
   trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl
   trunk/openvas-plugins/scripts/gb_adobe_reader_dos_vuln_may09_lin.nasl
   trunk/openvas-plugins/scripts/gb_apache_axis2_40976.nasl
   trunk/openvas-plugins/scripts/gb_apache_tomcat_45015.nasl
   trunk/openvas-plugins/scripts/gb_bournal_privilege_escalation_vuln.nasl
   trunk/openvas-plugins/scripts/gb_cups_guest_acc_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_diy_cms_mult_rfi_vuln.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2060_snort_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_219_samba_fc5.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2668_blam_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2985_kdewebdev_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_3952_epiphany_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_4461_e2fsprogs_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_582_spamassassin_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_2229_phpMyAdmin_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_6127_devhelp_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_6415_drupal_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_7269_xastir_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_9669_gnome-python2-extras_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_10369_w3m_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_11152_mipv6-daemon_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_13155_libHX_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14634_cabextract_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_14678_samba_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_15520_nss-softokn_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_17133_pam_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1936_galeon_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_5535_dsniff_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_5535_libnids_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_7844_html2ps_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10781_vips_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11936_ecryptfs-utils_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_14022_radvd_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_3627_openldap_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdebase_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8076_oprofile_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_9690_glpi-mass-ocs-import_fc14.nasl
   trunk/openvas-plugins/scripts/gb_flock_detect_lin.nasl
   trunk/openvas-plugins/scripts/gb_freeSSHd_38887.nasl
   trunk/openvas-plugins/scripts/gb_fsecure_prdts_detect_win.nasl
   trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_feb11_lin.nasl
   trunk/openvas-plugins/scripts/gb_home_ftp_server_dir_trav_vun.nasl
   trunk/openvas-plugins/scripts/gb_horde_lfi_vuln.nasl
   trunk/openvas-plugins/scripts/gb_hp_smh_insight_diag_mult_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02431.nasl
   trunk/openvas-plugins/scripts/gb_maildrop_priv_esc_vuln.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_006.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_018.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_096.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_130.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_192.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_163.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_229.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_100.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_117.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_257.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_108.nasl
   trunk/openvas-plugins/scripts/gb_mapserver_41855.nasl
   trunk/openvas-plugins/scripts/gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ms_windows_hid_over_usb_code_exec_vuln.nasl
   trunk/openvas-plugins/scripts/gb_openpro_detect.nasl
   trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win02_jul11.nasl
   trunk/openvas-plugins/scripts/gb_php_traverser_41899.nasl
   trunk/openvas-plugins/scripts/gb_phpkick_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_phpldapadmin_50331.nasl
   trunk/openvas-plugins/scripts/gb_phpmv_clickheat_unspecified_vuln.nasl
   trunk/openvas-plugins/scripts/gb_pyftpdlib_mult_vuln_01.nasl
   trunk/openvas-plugins/scripts/gb_qip_icq_message_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_quickphp_45626.nasl
   trunk/openvas-plugins/scripts/gb_raja_natarajan_guestbook_46098.nasl
   trunk/openvas-plugins/scripts/gb_solaris_109326_24.nasl
   trunk/openvas-plugins/scripts/gb_solaris_117123_08.nasl
   trunk/openvas-plugins/scripts/gb_solaris_120273_27.nasl
   trunk/openvas-plugins/scripts/gb_solaris_122212_32.nasl
   trunk/openvas-plugins/scripts/gb_solaris_141500_05.nasl
   trunk/openvas-plugins/scripts/gb_suse_2007_017.nasl
   trunk/openvas-plugins/scripts/gb_suse_2007_065.nasl
   trunk/openvas-plugins/scripts/gb_suse_2010_015.nasl
   trunk/openvas-plugins/scripts/gb_syncrify_detect.nasl
   trunk/openvas-plugins/scripts/gb_titan_ftp_server_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1018_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1031_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1064_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1136_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1169_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1238_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_398_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_417_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_550_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_635_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_887_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_927_3.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_998_1.nasl
   trunk/openvas-plugins/scripts/gb_vmware_prdts_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_wondercms_44916.nasl
   trunk/openvas-plugins/scripts/gb_xdataface_dataface_lfi_vuln.nasl
   trunk/openvas-plugins/scripts/gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_yaws_44564.nasl
   trunk/openvas-plugins/scripts/gb_zywall_usg_47707.nasl
   trunk/openvas-plugins/scripts/glsa_200312_02.nasl
   trunk/openvas-plugins/scripts/glsa_200406_17.nasl
   trunk/openvas-plugins/scripts/glsa_200408_17.nasl
   trunk/openvas-plugins/scripts/glsa_200409_05.nasl
   trunk/openvas-plugins/scripts/glsa_200411_07.nasl
   trunk/openvas-plugins/scripts/glsa_200411_25.nasl
   trunk/openvas-plugins/scripts/glsa_200412_13.nasl
   trunk/openvas-plugins/scripts/glsa_200503_16.nasl
   trunk/openvas-plugins/scripts/glsa_200511_14.nasl
   trunk/openvas-plugins/scripts/glsa_200608_04.nasl
   trunk/openvas-plugins/scripts/glsa_200608_07.nasl
   trunk/openvas-plugins/scripts/glsa_200612_14.nasl
   trunk/openvas-plugins/scripts/glsa_200701_14.nasl
   trunk/openvas-plugins/scripts/glsa_200701_24.nasl
   trunk/openvas-plugins/scripts/glsa_200703_15.nasl
   trunk/openvas-plugins/scripts/glsa_200707_10.nasl
   trunk/openvas-plugins/scripts/glsa_200709_18.nasl
   trunk/openvas-plugins/scripts/glsa_200803_19.nasl
   trunk/openvas-plugins/scripts/glsa_200904_09.nasl
   trunk/openvas-plugins/scripts/glsa_200909_06.nasl
   trunk/openvas-plugins/scripts/glsa_201006_13.nasl
   trunk/openvas-plugins/scripts/gravity_board_x_detect.nasl
   trunk/openvas-plugins/scripts/ilohamail_password_disclosure.nasl
   trunk/openvas-plugins/scripts/macosx_upd_10_5_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_022.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_046.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_160.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_176.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_256.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_290.nasl
   trunk/openvas-plugins/scripts/mozilla_certif_handle_dos.nasl
   trunk/openvas-plugins/scripts/mozilloCMS_34474.nasl
   trunk/openvas-plugins/scripts/netasq.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0308.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1206.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1364.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1465.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl
   trunk/openvas-plugins/scripts/phpgroupware_xss.nasl
   trunk/openvas-plugins/scripts/proftpd_36804.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_campsite_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_filezilla_server_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_feb10_lin.nasl
   trunk/openvas-plugins/scripts/secpod_hummingbird_activex_bof_vuln_900159.nasl
   trunk/openvas-plugins/scripts/secpod_mediawiki_mult_vuln_dec08.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-061_900051.nasl
   trunk/openvas-plugins/scripts/secpod_ms08-077.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-053.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-066.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-068.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-096.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-014.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-039.nasl
   trunk/openvas-plugins/scripts/secpod_opera_info_disc_unspecified_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_pango_detect.nasl
   trunk/openvas-plugins/scripts/secpod_pplive_code_exe_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/secpod_twiki_multiple_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_vmware_server_mult_xss_vuln_dec09_win.nasl
   trunk/openvas-plugins/scripts/secpod_xnview_mbm_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/sendmail_forword_include.nasl
   trunk/openvas-plugins/scripts/sitescope_management_server.nasl
   trunk/openvas-plugins/scripts/sles10_curl0.nasl
   trunk/openvas-plugins/scripts/sles10_freetype20.nasl
   trunk/openvas-plugins/scripts/sles10_nagios.nasl
   trunk/openvas-plugins/scripts/sles10_struts.nasl
   trunk/openvas-plugins/scripts/sles11_gstreamer-0_10-.nasl
   trunk/openvas-plugins/scripts/sles11_openswan1.nasl
   trunk/openvas-plugins/scripts/sles9p5009158.nasl
   trunk/openvas-plugins/scripts/sles9p5010873.nasl
   trunk/openvas-plugins/scripts/sles9p5013151.nasl
   trunk/openvas-plugins/scripts/sles9p5014940.nasl
   trunk/openvas-plugins/scripts/sles9p5019505.nasl
   trunk/openvas-plugins/scripts/sles9p5020179.nasl
   trunk/openvas-plugins/scripts/sles9p5020445.nasl
   trunk/openvas-plugins/scripts/sles9p5021923.nasl
   trunk/openvas-plugins/scripts/sles9p5049760.nasl
   trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl
   trunk/openvas-plugins/scripts/snitz_forums_2000_sql_injection.nasl
   trunk/openvas-plugins/scripts/snmp_default_communities.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl
   trunk/openvas-plugins/scripts/ubuntu_700_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_873_1.nasl
   trunk/openvas-plugins/scripts/vbulletin_init_php_flaw.nasl
   trunk/openvas-plugins/scripts/webfileexplorer_detect.nasl
   trunk/openvas-plugins/scripts/zabbix_detect.nasl
Log:
* scripts/deb_303_1.nasl,
scripts/gb_qip_icq_message_dos_vuln.nasl,
scripts/freebsd_openoffice.org0.nasl,
scripts/glsa_200412_13.nasl,
scripts/RHSA_2009_1066.nasl,
scripts/sles9p5021923.nasl,
scripts/ovcesa2009_1206.nasl,
scripts/secpod_realplayer_mult_vuln_macosx.nasl,
scripts/gb_RHSA-2010_0061-02_gzip.nasl,
scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl,
scripts/suse_sa_2009_003.nasl,
scripts/secpod_filezilla_server_bof_vuln.nasl,
scripts/gb_ubuntu_USN_1018_1.nasl,
scripts/deb_280_1.nasl,
scripts/glsa_200409_05.nasl,
scripts/snitz_forums_2000_sql_injection.nasl,
scripts/gb_ubuntu_USN_550_1.nasl,
scripts/gb_mandriva_MDVA_2008_096.nasl,
scripts/gb_ubuntu_USN_1238_2.nasl,
scripts/gb_hp_ux_HPSBUX00179.nasl,
scripts/deb_1417_1.nasl,
scripts/gb_fedora_2010_1936_galeon_fc11.nasl,
scripts/gb_ubuntu_USN_890_2.nasl,
scripts/sles9p5020179.nasl,
scripts/secpod_mediawiki_mult_vuln_dec08.nasl,
scripts/gb_fedora_2008_2229_phpMyAdmin_fc7.nasl,
scripts/ubuntu_700_1.nasl,
scripts/sles9p5019505.nasl,
scripts/freebsd_squid0.nasl,
scripts/glsa_200411_07.nasl,
scripts/gb_syncrify_detect.nasl,
scripts/chora_detect.nasl,
scripts/gb_freeSSHd_38887.nasl,
scripts/gb_vmware_prdts_dos_vuln_win.nasl,
scripts/fcore_2009_8477.nasl,
scripts/gb_phpldapadmin_50331.nasl,
scripts/secpod_vmware_server_mult_xss_vuln_dec09_win.nasl,
scripts/freebsd_peercast.nasl,
scripts/freebsd_tcpdump2.nasl,
scripts/gb_cups_guest_acc_dos_vuln.nasl,
scripts/phpgroupware_xss.nasl,
scripts/secpod_firefox_mult_vuln_feb10_lin.nasl,
scripts/gb_bournal_privilege_escalation_vuln.nasl,
scripts/deb_577_1.nasl,
scripts/macosx_upd_10_5_1.nasl,
scripts/gb_fedora_2010_13155_libHX_fc12.nasl,
scripts/sles9p5013151.nasl,
scripts/mdksa_2009_290.nasl,
scripts/gb_RHSA-2008_0059-01_wireshark.nasl,
scripts/secpod_adobe_coldfusion_multiple_xss_vuln.nasl,
scripts/glsa_200909_06.nasl,
scripts/gb_fedora_2010_15520_nss-softokn_fc13.nasl,
scripts/gb_mandriva_MDVSA_2010_257.nasl,
scripts/gb_RHSA-2011_1220-01_samba3x.nasl,
scripts/gravity_board_x_detect.nasl,
scripts/glsa_200709_18.nasl,
scripts/gb_PhreeBooks_detect.nasl,
scripts/deb_827_1.nasl,
scripts/gb_ubuntu_USN_417_2.nasl,
scripts/fcore_2009_3433.nasl,
scripts/gb_CESA-2008_0516_evolution_centos3_x86_64.nasl,
scripts/netasq.nasl,
scripts/secpod_xnview_mbm_bof_vuln_win.nasl,
scripts/gb_phpkick_sql_inj_vuln.nasl,
scripts/secpod_ms10-068.nasl,
scripts/deb_1888_1.nasl,
scripts/glsa_200411_25.nasl,
scripts/gb_maildrop_priv_esc_vuln.nasl,
scripts/secpod_pplive_code_exe_vuln.nasl,
scripts/mdksa_2009_256.nasl,
scripts/gb_fedora_2010_5535_dsniff_fc12.nasl,
scripts/gb_fedora_2007_3952_epiphany_fc7.nasl,
scripts/gb_solaris_141500_05.nasl,
scripts/gb_diy_cms_mult_rfi_vuln.nasl,
scripts/deb_1573_1.nasl,
scripts/gb_CESA-2010_0578_freetype_centos5_i386.nasl,
scripts/ovcesa2009_1101.nasl,
scripts/JM_Fluxay.nasl,
scripts/gb_fedora_2011_8076_oprofile_fc15.nasl,
scripts/glsa_200701_24.nasl,
scripts/ovcesa2009_1364.nasl,
scripts/gb_fsecure_prdts_detect_win.nasl,
scripts/glsa_200406_17.nasl,
scripts/gb_google_chrome_mult_vuln_feb11_lin.nasl,
scripts/secpod_opera_info_disc_unspecified_vuln_win.nasl,
scripts/sles9p5009158.nasl,
scripts/gb_ubuntu_USN_398_2.nasl,
scripts/gb_apache_axis2_40976.nasl,
scripts/gb_suse_2007_017.nasl,
scripts/gb_solaris_120273_27.nasl,
scripts/sles10_freetype20.nasl,
scripts/gb_RHSA-2010_0792-01_kernel.nasl,
scripts/ovcesa2009_1674.nasl,
scripts/gb_ubuntu_USN_1031_1.nasl,
scripts/gb_ubuntu_USN_887_1.nasl,
scripts/secpod_ms10-096.nasl,
scripts/freebsd_pam_smb.nasl,
scripts/glsa_200608_04.nasl,
scripts/glsa_200608_07.nasl,
scripts/gb_CESA-2009_0437_seamonkey_centos4_i386.nasl,
scripts/freebsd_pcre1.nasl,
scripts/deb_434_1.nasl,
scripts/deb_065_1.nasl,
scripts/fcore_2009_1523.nasl,
scripts/fcore_2009_1343.nasl,
scripts/gb_fedora_2011_11936_ecryptfs-utils_fc15.nasl,
scripts/gb_fedora_2008_7269_xastir_fc8.nasl,
scripts/sles9p5014940.nasl,
scripts/freebsd_gnutls5.nasl,
scripts/gb_fedora_2010_14634_cabextract_fc12.nasl,
scripts/gb_fedora_2007_2985_kdewebdev_fc7.nasl,
scripts/secpod_ms11-039.nasl,
scripts/gb_fedora_2010_14678_samba_fc12.nasl,
scripts/mdksa_2009_022.nasl,
scripts/deb_2062_1.nasl,
scripts/freebsd_drupal50.nasl,
scripts/cgicso_command_execution.nasl,
scripts/deb_2244_1.nasl,
scripts/secpod_ms11-014.nasl,
scripts/webfileexplorer_detect.nasl,
scripts/fcore_2009_5568.nasl,
scripts/gb_titan_ftp_server_dos_vuln.nasl,
scripts/proftpd_36804.nasl,
scripts/freebsd_postnuke.nasl,
scripts/gb_mandriva_MDVA_2010_163.nasl,
scripts/account_db2inst1_ibmdb2.nasl,
scripts/gb_mandriva_MDVA_2010_229.nasl,
scripts/freebsd_webcalendar.nasl,
scripts/gb_fedora_2011_10781_vips_fc14.nasl,
scripts/sles9p5010873.nasl,
scripts/deb_967_1.nasl,
scripts/vbulletin_init_php_flaw.nasl,
scripts/gb_opera_mult_vuln_win02_jul11.nasl,
scripts/mdksa_2009_176.nasl,
scripts/deb_1550_1.nasl,
scripts/glsa_200707_10.nasl,
scripts/secpod_ms08-077.nasl,
scripts/gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl,
scripts/ilohamail_password_disclosure.nasl,
scripts/gb_RHSA-2011_1164-01_firefox.nasl,
scripts/gb_flock_detect_lin.nasl,
scripts/ubuntu_873_1.nasl,
scripts/gb_fedora_2010_17133_pam_fc12.nasl,
scripts/gb_solaris_122212_32.nasl,
scripts/gb_fedora_2011_5200_kdebase_fc14.nasl,
scripts/glsa_200503_16.nasl,
scripts/gb_raja_natarajan_guestbook_46098.nasl,
scripts/gb_solaris_117123_08.nasl,
scripts/freebsd_php54.nasl,
scripts/glsa_200312_02.nasl,
scripts/mozilla_certif_handle_dos.nasl,
scripts/freebsd_gnupg6.nasl,
scripts/gb_ubuntu_USN_1169_1.nasl,
scripts/gb_wondercms_44916.nasl,
scripts/fcore_2009_8611.nasl,
scripts/glsa_200803_19.nasl,
scripts/gb_fedora_2008_6415_drupal_fc9.nasl,
scripts/gb_ubuntu_USN_1064_1.nasl,
scripts/sitescope_management_server.nasl,
scripts/secpod_ms10-066.nasl,
scripts/gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl,
scripts/sles9p5020445.nasl,
scripts/gb_fedora_2008_6127_devhelp_fc8.nasl,
scripts/deb_078_1.nasl,
scripts/gb_suse_2007_065.nasl,
scripts/gb_mandriva_MDVSA_2011_108.nasl,
scripts/RHSA_2009_0014.nasl,
scripts/secpod_hummingbird_activex_bof_vuln_900159.nasl,
scripts/gb_fedora_2007_4461_e2fsprogs_fc7.nasl,
scripts/RHSA_2009_1189.nasl,
scripts/gb_adobe_reader_dos_vuln_may09_lin.nasl,
scripts/gb_suse_2010_015.nasl,
scripts/ovcesa2009_0308.nasl,
scripts/gb_CESA-2010_0977_openssl_centos4_i386.nasl,
scripts/gb_fedora_2010_5535_libnids_fc12.nasl,
scripts/gb_fedora_2011_3627_openldap_fc14.nasl,
scripts/gb_hp_ux_HPSBUX00249.nasl,
scripts/deb_1148_1.nasl,
scripts/gb_apache_tomcat_45015.nasl,
scripts/deb_1486_1.nasl,
scripts/deb_1625_1.nasl,
scripts/dcshop_information_disclosure.nasl,
scripts/zabbix_detect.nasl,
scripts/DDI_JRun_Traversal.nasl,
scripts/gb_fedora_2007_2060_snort_fc7.nasl,
scripts/deb_2231_1.nasl,
scripts/gb_hp_ux_HPSBUX02431.nasl,
scripts/sles10_curl0.nasl,
scripts/gb_mandriva_MDVA_2008_130.nasl,
scripts/gb_openpro_detect.nasl,
scripts/gb_ubuntu_USN_927_3.nasl,
scripts/gb_fedora_2007_582_spamassassin_fc6.nasl,
scripts/deb_766_1.nasl,
scripts/ovcesa2009_1465.nasl,
scripts/secpod_pango_detect.nasl,
scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl,
scripts/gb_mandriva_MDVA_2008_018.nasl,
scripts/deb_991_1.nasl,
scripts/deb_010_1.nasl,
scripts/snmp_default_communities.nasl,
scripts/gb_fedora_2010_11152_mipv6-daemon_fc13.nasl,
scripts/sles9p5049760.nasl,
scripts/gb_fedora_2010_10369_w3m_fc12.nasl,
scripts/freebsd_cups-base0.nasl,
scripts/gb_xdataface_dataface_lfi_vuln.nasl,
scripts/gb_solaris_109326_24.nasl,
scripts/glsa_200904_09.nasl,
scripts/freebsdsa_ntpd.nasl,
scripts/deb_1981_1.nasl,
scripts/gb_pyftpdlib_mult_vuln_01.nasl,
scripts/glsa_200703_15.nasl,
scripts/freebsd_dojo.nasl,
scripts/deb_563_1.nasl,
scripts/freebsd_freeradius1.nasl,
scripts/gb_fedora_2008_9669_gnome-python2-extras_fc9.nasl,
scripts/secpod_campsite_sql_inj_vuln.nasl,
scripts/fcore_2009_10718.nasl,
scripts/gb_fedora_2011_14022_radvd_fc15.nasl,
scripts/gb_CESA-2009_1061_freetype_centos5_i386.nasl,
scripts/deb_848_1.nasl,
scripts/gb_CESA-2010_0153_thunderbird_centos5_i386.nasl,
scripts/mozilloCMS_34474.nasl,
scripts/gb_ubuntu_USN_998_1.nasl,
scripts/freebsd_ffmpeg.nasl,
scripts/freebsd_squid12.nasl,
scripts/secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl,
scripts/gb_ms_windows_hid_over_usb_code_exec_vuln.nasl,
scripts/gb_hp_ux_HPSBUX00178.nasl,
scripts/gb_yaws_44564.nasl,
scripts/gb_fedora_2007_2668_blam_fc7.nasl,
scripts/deb_689_1.nasl,
scripts/freebsd_linux-gdk-pixbuf.nasl,
scripts/fcore_2008_11736.nasl,
scripts/gb_CESA-2008_0059_libsmi_centos3_i386.nasl,
scripts/mdksa_2009_046.nasl,
scripts/gb_zywall_usg_47707.nasl,
scripts/glsa_200511_14.nasl,
scripts/gb_mandriva_MDVSA_2010_100.nasl,
scripts/gb_mapserver_41855.nasl,
scripts/sles11_openswan1.nasl,
scripts/freebsd_libsndfile1.nasl,
scripts/fcore_2009_4875.nasl,
scripts/gb_PreProjects_50309.nasl,
scripts/gb_ubuntu_USN_635_1.nasl,
scripts/sles10_nagios.nasl,
scripts/freebsd_gd0.nasl,
scripts/sles10_struts.nasl,
scripts/gb_CESA-2011_0477_gstreamer-plugins_centos4_i386.nasl,
scripts/gb_RHSA-2010_0678-01_rpm.nasl,
scripts/deb_1313_1.nasl,
scripts/secpod_twiki_multiple_xss_vuln.nasl,
scripts/freebsd_bind98.nasl,
scripts/gb_ubuntu_USN_1136_1.nasl,
scripts/gb_CESA-2008_0965-01_lynx_centos2_i386.nasl,
scripts/gb_fedora_2007_219_samba_fc5.nasl,
scripts/freebsd_rxvt-unicode0.nasl,
scripts/freebsd_bugzilla10.nasl,
scripts/gb_home_ftp_server_dir_trav_vun.nasl,
scripts/freebsd_ipsec-tools.nasl,
scripts/gb_mandriva_MDKSA_2007_006.nasl,
scripts/deb_2219_1.nasl,
scripts/gb_RHSA-2008_0863-01_libtiff.nasl,
scripts/gb_hp_smh_insight_diag_mult_xss_vuln.nasl,
scripts/freebsd_curl3.nasl,
scripts/deb_1440_1.nasl,
scripts/gb_phpmv_clickheat_unspecified_vuln.nasl,
scripts/RHSA_2009_1136.nasl,
scripts/fcore_2009_8487.nasl,
scripts/deb_1201_1.nasl,
scripts/secpod_ms08-061_900051.nasl,
scripts/glsa_201006_13.nasl,
scripts/gb_fedora_2010_7844_html2ps_fc12.nasl,
scripts/gb_CESA-2008_0176_openoffice.org_centos3_x86_64.nasl,
scripts/deb_1748_1.nasl,
scripts/sendmail_forword_include.nasl,
scripts/cerberus_ftp_36134.nasl,
scripts/deb_730_1.nasl,
scripts/freebsd_mod_python0.nasl,
scripts/deb_1609_1.nasl,
scripts/gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl,
scripts/smb_reg_service_pack_XP.nasl,
scripts/gb_quickphp_45626.nasl,
scripts/gb_php_traverser_41899.nasl,
scripts/glsa_200408_17.nasl,
scripts/gb_fedora_2011_9690_glpi-mass-ocs-import_fc14.nasl,
scripts/gb_horde_lfi_vuln.nasl,
scripts/mdksa_2009_160.nasl,
scripts/glsa_200701_14.nasl,
scripts/gb_mandriva_MDVA_2008_192.nasl,
scripts/TYPSoft_ftp_server_34901.nasl,
scripts/secpod_ms09-053.nasl,
scripts/fcore_2009_5773.nasl,
scripts/freebsd_suphp.nasl,
scripts/gb_mandriva_MDVSA_2010_117.nasl,
scripts/deb_643_1.nasl,
scripts/ftpglob.nasl,
scripts/freebsd_linux-flashplugin5.nasl,
scripts/sles11_gstreamer-0_10-.nasl,
scripts/gb_CESA-2009_0431_kdegraphics_centos4_i386.nasl,
scripts/glsa_200612_14.nasl:
Updated script metadata (changes for CR56).



Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/ChangeLog	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,3 +1,307 @@
+2011-11-09  Henri Doreau <henri.doreau at greenbone.net>
+
+	* scripts/deb_303_1.nasl,
+	scripts/gb_qip_icq_message_dos_vuln.nasl,
+	scripts/freebsd_openoffice.org0.nasl,
+	scripts/glsa_200412_13.nasl,
+	scripts/RHSA_2009_1066.nasl,
+	scripts/sles9p5021923.nasl,
+	scripts/ovcesa2009_1206.nasl,
+	scripts/secpod_realplayer_mult_vuln_macosx.nasl,
+	scripts/gb_RHSA-2010_0061-02_gzip.nasl,
+	scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl,
+	scripts/suse_sa_2009_003.nasl,
+	scripts/secpod_filezilla_server_bof_vuln.nasl,
+	scripts/gb_ubuntu_USN_1018_1.nasl,
+	scripts/deb_280_1.nasl,
+	scripts/glsa_200409_05.nasl,
+	scripts/snitz_forums_2000_sql_injection.nasl,
+	scripts/gb_ubuntu_USN_550_1.nasl,
+	scripts/gb_mandriva_MDVA_2008_096.nasl,
+	scripts/gb_ubuntu_USN_1238_2.nasl,
+	scripts/gb_hp_ux_HPSBUX00179.nasl,
+	scripts/deb_1417_1.nasl,
+	scripts/gb_fedora_2010_1936_galeon_fc11.nasl,
+	scripts/gb_ubuntu_USN_890_2.nasl,
+	scripts/sles9p5020179.nasl,
+	scripts/secpod_mediawiki_mult_vuln_dec08.nasl,
+	scripts/gb_fedora_2008_2229_phpMyAdmin_fc7.nasl,
+	scripts/ubuntu_700_1.nasl,
+	scripts/sles9p5019505.nasl,
+	scripts/freebsd_squid0.nasl,
+	scripts/glsa_200411_07.nasl,
+	scripts/gb_syncrify_detect.nasl,
+	scripts/chora_detect.nasl,
+	scripts/gb_freeSSHd_38887.nasl,
+	scripts/gb_vmware_prdts_dos_vuln_win.nasl,
+	scripts/fcore_2009_8477.nasl,
+	scripts/gb_phpldapadmin_50331.nasl,
+	scripts/secpod_vmware_server_mult_xss_vuln_dec09_win.nasl,
+	scripts/freebsd_peercast.nasl,
+	scripts/freebsd_tcpdump2.nasl,
+	scripts/gb_cups_guest_acc_dos_vuln.nasl,
+	scripts/phpgroupware_xss.nasl,
+	scripts/secpod_firefox_mult_vuln_feb10_lin.nasl,
+	scripts/gb_bournal_privilege_escalation_vuln.nasl,
+	scripts/deb_577_1.nasl,
+	scripts/macosx_upd_10_5_1.nasl,
+	scripts/gb_fedora_2010_13155_libHX_fc12.nasl,
+	scripts/sles9p5013151.nasl,
+	scripts/mdksa_2009_290.nasl,
+	scripts/gb_RHSA-2008_0059-01_wireshark.nasl,
+	scripts/secpod_adobe_coldfusion_multiple_xss_vuln.nasl,
+	scripts/glsa_200909_06.nasl,
+	scripts/gb_fedora_2010_15520_nss-softokn_fc13.nasl,
+	scripts/gb_mandriva_MDVSA_2010_257.nasl,
+	scripts/gb_RHSA-2011_1220-01_samba3x.nasl,
+	scripts/gravity_board_x_detect.nasl,
+	scripts/glsa_200709_18.nasl,
+	scripts/gb_PhreeBooks_detect.nasl,
+	scripts/deb_827_1.nasl,
+	scripts/gb_ubuntu_USN_417_2.nasl,
+	scripts/fcore_2009_3433.nasl,
+	scripts/gb_CESA-2008_0516_evolution_centos3_x86_64.nasl,
+	scripts/netasq.nasl,
+	scripts/secpod_xnview_mbm_bof_vuln_win.nasl,
+	scripts/gb_phpkick_sql_inj_vuln.nasl,
+	scripts/secpod_ms10-068.nasl,
+	scripts/deb_1888_1.nasl,
+	scripts/glsa_200411_25.nasl,
+	scripts/gb_maildrop_priv_esc_vuln.nasl,
+	scripts/secpod_pplive_code_exe_vuln.nasl,
+	scripts/mdksa_2009_256.nasl,
+	scripts/gb_fedora_2010_5535_dsniff_fc12.nasl,
+	scripts/gb_fedora_2007_3952_epiphany_fc7.nasl,
+	scripts/gb_solaris_141500_05.nasl,
+	scripts/gb_diy_cms_mult_rfi_vuln.nasl,
+	scripts/deb_1573_1.nasl,
+	scripts/gb_CESA-2010_0578_freetype_centos5_i386.nasl,
+	scripts/ovcesa2009_1101.nasl,
+	scripts/JM_Fluxay.nasl,
+	scripts/gb_fedora_2011_8076_oprofile_fc15.nasl,
+	scripts/glsa_200701_24.nasl,
+	scripts/ovcesa2009_1364.nasl,
+	scripts/gb_fsecure_prdts_detect_win.nasl,
+	scripts/glsa_200406_17.nasl,
+	scripts/gb_google_chrome_mult_vuln_feb11_lin.nasl,
+	scripts/secpod_opera_info_disc_unspecified_vuln_win.nasl,
+	scripts/sles9p5009158.nasl,
+	scripts/gb_ubuntu_USN_398_2.nasl,
+	scripts/gb_apache_axis2_40976.nasl,
+	scripts/gb_suse_2007_017.nasl,
+	scripts/gb_solaris_120273_27.nasl,
+	scripts/sles10_freetype20.nasl,
+	scripts/gb_RHSA-2010_0792-01_kernel.nasl,
+	scripts/ovcesa2009_1674.nasl,
+	scripts/gb_ubuntu_USN_1031_1.nasl,
+	scripts/gb_ubuntu_USN_887_1.nasl,
+	scripts/secpod_ms10-096.nasl,
+	scripts/freebsd_pam_smb.nasl,
+	scripts/glsa_200608_04.nasl,
+	scripts/glsa_200608_07.nasl,
+	scripts/gb_CESA-2009_0437_seamonkey_centos4_i386.nasl,
+	scripts/freebsd_pcre1.nasl,
+	scripts/deb_434_1.nasl,
+	scripts/deb_065_1.nasl,
+	scripts/fcore_2009_1523.nasl,
+	scripts/fcore_2009_1343.nasl,
+	scripts/gb_fedora_2011_11936_ecryptfs-utils_fc15.nasl,
+	scripts/gb_fedora_2008_7269_xastir_fc8.nasl,
+	scripts/sles9p5014940.nasl,
+	scripts/freebsd_gnutls5.nasl,
+	scripts/gb_fedora_2010_14634_cabextract_fc12.nasl,
+	scripts/gb_fedora_2007_2985_kdewebdev_fc7.nasl,
+	scripts/secpod_ms11-039.nasl,
+	scripts/gb_fedora_2010_14678_samba_fc12.nasl,
+	scripts/mdksa_2009_022.nasl,
+	scripts/deb_2062_1.nasl,
+	scripts/freebsd_drupal50.nasl,
+	scripts/cgicso_command_execution.nasl,
+	scripts/deb_2244_1.nasl,
+	scripts/secpod_ms11-014.nasl,
+	scripts/webfileexplorer_detect.nasl,
+	scripts/fcore_2009_5568.nasl,
+	scripts/gb_titan_ftp_server_dos_vuln.nasl,
+	scripts/proftpd_36804.nasl,
+	scripts/freebsd_postnuke.nasl,
+	scripts/gb_mandriva_MDVA_2010_163.nasl,
+	scripts/account_db2inst1_ibmdb2.nasl,
+	scripts/gb_mandriva_MDVA_2010_229.nasl,
+	scripts/freebsd_webcalendar.nasl,
+	scripts/gb_fedora_2011_10781_vips_fc14.nasl,
+	scripts/sles9p5010873.nasl,
+	scripts/deb_967_1.nasl,
+	scripts/vbulletin_init_php_flaw.nasl,
+	scripts/gb_opera_mult_vuln_win02_jul11.nasl,
+	scripts/mdksa_2009_176.nasl,
+	scripts/deb_1550_1.nasl,
+	scripts/glsa_200707_10.nasl,
+	scripts/secpod_ms08-077.nasl,
+	scripts/gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl,
+	scripts/ilohamail_password_disclosure.nasl,
+	scripts/gb_RHSA-2011_1164-01_firefox.nasl,
+	scripts/gb_flock_detect_lin.nasl,
+	scripts/ubuntu_873_1.nasl,
+	scripts/gb_fedora_2010_17133_pam_fc12.nasl,
+	scripts/gb_solaris_122212_32.nasl,
+	scripts/gb_fedora_2011_5200_kdebase_fc14.nasl,
+	scripts/glsa_200503_16.nasl,
+	scripts/gb_raja_natarajan_guestbook_46098.nasl,
+	scripts/gb_solaris_117123_08.nasl,
+	scripts/freebsd_php54.nasl,
+	scripts/glsa_200312_02.nasl,
+	scripts/mozilla_certif_handle_dos.nasl,
+	scripts/freebsd_gnupg6.nasl,
+	scripts/gb_ubuntu_USN_1169_1.nasl,
+	scripts/gb_wondercms_44916.nasl,
+	scripts/fcore_2009_8611.nasl,
+	scripts/glsa_200803_19.nasl,
+	scripts/gb_fedora_2008_6415_drupal_fc9.nasl,
+	scripts/gb_ubuntu_USN_1064_1.nasl,
+	scripts/sitescope_management_server.nasl,
+	scripts/secpod_ms10-066.nasl,
+	scripts/gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl,
+	scripts/sles9p5020445.nasl,
+	scripts/gb_fedora_2008_6127_devhelp_fc8.nasl,
+	scripts/deb_078_1.nasl,
+	scripts/gb_suse_2007_065.nasl,
+	scripts/gb_mandriva_MDVSA_2011_108.nasl,
+	scripts/RHSA_2009_0014.nasl,
+	scripts/secpod_hummingbird_activex_bof_vuln_900159.nasl,
+	scripts/gb_fedora_2007_4461_e2fsprogs_fc7.nasl,
+	scripts/RHSA_2009_1189.nasl,
+	scripts/gb_adobe_reader_dos_vuln_may09_lin.nasl,
+	scripts/gb_suse_2010_015.nasl,
+	scripts/ovcesa2009_0308.nasl,
+	scripts/gb_CESA-2010_0977_openssl_centos4_i386.nasl,
+	scripts/gb_fedora_2010_5535_libnids_fc12.nasl,
+	scripts/gb_fedora_2011_3627_openldap_fc14.nasl,
+	scripts/gb_hp_ux_HPSBUX00249.nasl,
+	scripts/deb_1148_1.nasl,
+	scripts/gb_apache_tomcat_45015.nasl,
+	scripts/deb_1486_1.nasl,
+	scripts/deb_1625_1.nasl,
+	scripts/dcshop_information_disclosure.nasl,
+	scripts/zabbix_detect.nasl,
+	scripts/DDI_JRun_Traversal.nasl,
+	scripts/gb_fedora_2007_2060_snort_fc7.nasl,
+	scripts/deb_2231_1.nasl,
+	scripts/gb_hp_ux_HPSBUX02431.nasl,
+	scripts/sles10_curl0.nasl,
+	scripts/gb_mandriva_MDVA_2008_130.nasl,
+	scripts/gb_openpro_detect.nasl,
+	scripts/gb_ubuntu_USN_927_3.nasl,
+	scripts/gb_fedora_2007_582_spamassassin_fc6.nasl,
+	scripts/deb_766_1.nasl,
+	scripts/ovcesa2009_1465.nasl,
+	scripts/secpod_pango_detect.nasl,
+	scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl,
+	scripts/gb_mandriva_MDVA_2008_018.nasl,
+	scripts/deb_991_1.nasl,
+	scripts/deb_010_1.nasl,
+	scripts/snmp_default_communities.nasl,
+	scripts/gb_fedora_2010_11152_mipv6-daemon_fc13.nasl,
+	scripts/sles9p5049760.nasl,
+	scripts/gb_fedora_2010_10369_w3m_fc12.nasl,
+	scripts/freebsd_cups-base0.nasl,
+	scripts/gb_xdataface_dataface_lfi_vuln.nasl,
+	scripts/gb_solaris_109326_24.nasl,
+	scripts/glsa_200904_09.nasl,
+	scripts/freebsdsa_ntpd.nasl,
+	scripts/deb_1981_1.nasl,
+	scripts/gb_pyftpdlib_mult_vuln_01.nasl,
+	scripts/glsa_200703_15.nasl,
+	scripts/freebsd_dojo.nasl,
+	scripts/deb_563_1.nasl,
+	scripts/freebsd_freeradius1.nasl,
+	scripts/gb_fedora_2008_9669_gnome-python2-extras_fc9.nasl,
+	scripts/secpod_campsite_sql_inj_vuln.nasl,
+	scripts/fcore_2009_10718.nasl,
+	scripts/gb_fedora_2011_14022_radvd_fc15.nasl,
+	scripts/gb_CESA-2009_1061_freetype_centos5_i386.nasl,
+	scripts/deb_848_1.nasl,
+	scripts/gb_CESA-2010_0153_thunderbird_centos5_i386.nasl,
+	scripts/mozilloCMS_34474.nasl,
+	scripts/gb_ubuntu_USN_998_1.nasl,
+	scripts/freebsd_ffmpeg.nasl,
+	scripts/freebsd_squid12.nasl,
+	scripts/secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl,
+	scripts/gb_ms_windows_hid_over_usb_code_exec_vuln.nasl,
+	scripts/gb_hp_ux_HPSBUX00178.nasl,
+	scripts/gb_yaws_44564.nasl,
+	scripts/gb_fedora_2007_2668_blam_fc7.nasl,
+	scripts/deb_689_1.nasl,
+	scripts/freebsd_linux-gdk-pixbuf.nasl,
+	scripts/fcore_2008_11736.nasl,
+	scripts/gb_CESA-2008_0059_libsmi_centos3_i386.nasl,
+	scripts/mdksa_2009_046.nasl,
+	scripts/gb_zywall_usg_47707.nasl,
+	scripts/glsa_200511_14.nasl,
+	scripts/gb_mandriva_MDVSA_2010_100.nasl,
+	scripts/gb_mapserver_41855.nasl,
+	scripts/sles11_openswan1.nasl,
+	scripts/freebsd_libsndfile1.nasl,
+	scripts/fcore_2009_4875.nasl,
+	scripts/gb_PreProjects_50309.nasl,
+	scripts/gb_ubuntu_USN_635_1.nasl,
+	scripts/sles10_nagios.nasl,
+	scripts/freebsd_gd0.nasl,
+	scripts/sles10_struts.nasl,
+	scripts/gb_CESA-2011_0477_gstreamer-plugins_centos4_i386.nasl,
+	scripts/gb_RHSA-2010_0678-01_rpm.nasl,
+	scripts/deb_1313_1.nasl,
+	scripts/secpod_twiki_multiple_xss_vuln.nasl,
+	scripts/freebsd_bind98.nasl,
+	scripts/gb_ubuntu_USN_1136_1.nasl,
+	scripts/gb_CESA-2008_0965-01_lynx_centos2_i386.nasl,
+	scripts/gb_fedora_2007_219_samba_fc5.nasl,
+	scripts/freebsd_rxvt-unicode0.nasl,
+	scripts/freebsd_bugzilla10.nasl,
+	scripts/gb_home_ftp_server_dir_trav_vun.nasl,
+	scripts/freebsd_ipsec-tools.nasl,
+	scripts/gb_mandriva_MDKSA_2007_006.nasl,
+	scripts/deb_2219_1.nasl,
+	scripts/gb_RHSA-2008_0863-01_libtiff.nasl,
+	scripts/gb_hp_smh_insight_diag_mult_xss_vuln.nasl,
+	scripts/freebsd_curl3.nasl,
+	scripts/deb_1440_1.nasl,
+	scripts/gb_phpmv_clickheat_unspecified_vuln.nasl,
+	scripts/RHSA_2009_1136.nasl,
+	scripts/fcore_2009_8487.nasl,
+	scripts/deb_1201_1.nasl,
+	scripts/secpod_ms08-061_900051.nasl,
+	scripts/glsa_201006_13.nasl,
+	scripts/gb_fedora_2010_7844_html2ps_fc12.nasl,
+	scripts/gb_CESA-2008_0176_openoffice.org_centos3_x86_64.nasl,
+	scripts/deb_1748_1.nasl,
+	scripts/sendmail_forword_include.nasl,
+	scripts/cerberus_ftp_36134.nasl,
+	scripts/deb_730_1.nasl,
+	scripts/freebsd_mod_python0.nasl,
+	scripts/deb_1609_1.nasl,
+	scripts/gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl,
+	scripts/smb_reg_service_pack_XP.nasl,
+	scripts/gb_quickphp_45626.nasl,
+	scripts/gb_php_traverser_41899.nasl,
+	scripts/glsa_200408_17.nasl,
+	scripts/gb_fedora_2011_9690_glpi-mass-ocs-import_fc14.nasl,
+	scripts/gb_horde_lfi_vuln.nasl,
+	scripts/mdksa_2009_160.nasl,
+	scripts/glsa_200701_14.nasl,
+	scripts/gb_mandriva_MDVA_2008_192.nasl,
+	scripts/TYPSoft_ftp_server_34901.nasl,
+	scripts/secpod_ms09-053.nasl,
+	scripts/fcore_2009_5773.nasl,
+	scripts/freebsd_suphp.nasl,
+	scripts/gb_mandriva_MDVSA_2010_117.nasl,
+	scripts/deb_643_1.nasl,
+	scripts/ftpglob.nasl,
+	scripts/freebsd_linux-flashplugin5.nasl,
+	scripts/sles11_gstreamer-0_10-.nasl,
+	scripts/gb_CESA-2009_0431_kdegraphics_centos4_i386.nasl,
+	scripts/glsa_200612_14.nasl:
+	Updated script metadata (changes for CR56).
+
 2011-11-09  Antu Sanadi <santu at secpod.com>
 
 	* scripts/secpod_ms11-086.nasl:

Modified: trunk/openvas-plugins/scripts/DDI_JRun_Traversal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/DDI_JRun_Traversal.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/DDI_JRun_Traversal.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
     script_id(10997);
     script_version("$Revision$");
+    script_tag(name:"last_modification", value:"$Date$");
+    script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
     script_cve_id("CVE-2001-1544");
     script_bugtraq_id(3666);
     script_tag(name:"cvss_base", value:"5.0");
@@ -43,11 +45,9 @@
 
 Solution:  The vendor has addressed this issue in Macromedia Product Security
 Bulletin MPSB01-17.  Please upgrade to the latest version of JRun available
-from http://www.allaire.com/
+from http://www.allaire.com/";
 
-Risk factor: Medium";
 
-
     script_description(desc);
 
     summary = "Attempts directory traversal attack";

Modified: trunk/openvas-plugins/scripts/JM_Fluxay.nasl
===================================================================
--- trunk/openvas-plugins/scripts/JM_Fluxay.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/JM_Fluxay.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,6 +28,8 @@
 {
  script_id(11880);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Fluxay Sensor Detection";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0014.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(63191);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)");
  script_cve_id("CVE-2008-3275", "CVE-2008-4933", "CVE-2008-4934", "CVE-2008-5025", "CVE-2008-5029", "CVE-2008-5300", "CVE-2008-5702");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -48,10 +50,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-0014.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:0014";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1066.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64063);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2009-1578", "CVE-2009-1579", "CVE-2009-1581");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -68,10 +70,8 @@
 http://www.redhat.com/security/updates/classification/#important
 http://www.squirrelmail.org/security/issue/2009-05-08
 http://www.squirrelmail.org/security/issue/2009-05-10
-http://www.squirrelmail.org/security/issue/2009-05-12
+http://www.squirrelmail.org/security/issue/2009-05-12";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:1066";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1136.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1136.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1136.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64386);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)");
  script_cve_id("CVE-2009-0692");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -57,10 +59,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1136.html
-http://www.redhat.com/security/updates/classification/#critical
+http://www.redhat.com/security/updates/classification/#critical";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:1136";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1189.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1189.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1189.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64512);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-1862", "CVE-2009-1863", "CVE-2009-1864", "CVE-2009-1865", "CVE-2009-1866", "CVE-2009-1867", "CVE-2009-1868", "CVE-2009-1869", "CVE-2009-1870");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -65,10 +67,8 @@
 
 http://rhn.redhat.com/errata/RHSA-2009-1189.html
 http://www.redhat.com/security/updates/classification/#critical
-http://www.adobe.com/support/security/bulletins/apsb09-10.html
+http://www.adobe.com/support/security/bulletins/apsb09-10.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1189");

Modified: trunk/openvas-plugins/scripts/TYPSoft_ftp_server_34901.nasl
===================================================================
--- trunk/openvas-plugins/scripts/TYPSoft_ftp_server_34901.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/TYPSoft_ftp_server_34901.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
   script_id(100198);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-12 22:04:51 +0200 (Tue, 12 May 2009)");
   script_tag(name:"cvss_base", value:"4.0");
  script_cve_id("CVE-2009-1668");
  script_bugtraq_id(34901);
@@ -47,10 +49,8 @@
    affected. 
 
   See also:
-   http://www.securityfocus.com/bid/34901
+   http://www.securityfocus.com/bid/34901";
 
-  Risk factor : Medium";
-
   script_name("TYPSoft FTP Server 'ABORT' Command Remote Denial of Service Vulnerability");
   script_description(desc);
   script_summary("Determine if TYPSoft FTP Server Version <= 1.11");

Modified: trunk/openvas-plugins/scripts/account_db2inst1_ibmdb2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/account_db2inst1_ibmdb2.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/account_db2inst1_ibmdb2.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(11859);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_cve_id("CVE-2001-0051");

Modified: trunk/openvas-plugins/scripts/cerberus_ftp_36134.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cerberus_ftp_36134.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/cerberus_ftp_36134.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,6 +28,8 @@
 {
  script_id(100260);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-26 11:37:11 +0200 (Wed, 26 Aug 2009)");
  script_bugtraq_id(36134);
  script_tag(name:"risk_factor", value:"Medium");
 
@@ -45,11 +47,8 @@
 
 References:
 http://www.securityfocus.com/bid/36134
-http://www.cerberusftp.com/index.html
+http://www.cerberusftp.com/index.html";
 
-
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if Cerberus FTP Server is prone to a	buffer-overflow vulnerability");
  script_category(ACT_DENIAL);

Modified: trunk/openvas-plugins/scripts/cgicso_command_execution.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cgicso_command_execution.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/cgicso_command_execution.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(10779);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2002-1652");
  script_bugtraq_id(6141);
  script_tag(name:"cvss_base", value:"7.5");
@@ -51,10 +53,8 @@
 Example:
 Define the following in cgicso.h:
 #define CGI_CSO_HARDCODE
-#define CGI_CSO_FINGERHOST 'localhost'
+#define CGI_CSO_FINGERHOST 'localhost'";
 
-Risk factor : High";
-
  script_description(desc);
  script_summary("Determine if a remote host is vulnerable to the cgicso vulnerability");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/chora_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/chora_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/chora_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,14 +29,14 @@
 extracts version numbers and locations of any instances found. 
 
 Chora is a PHP-based interface to CVS repositories from the Horde
-Project. See http://www.horde.org/chora/ for more information. 
+Project. See http://www.horde.org/chora/ for more information. ";
 
-Risk factor : None";
 
-
 if (description) {
   script_id(13849);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"None");
  
   name = "Chora Detection";

Modified: trunk/openvas-plugins/scripts/dcshop_information_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/dcshop_information_disclosure.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/dcshop_information_disclosure.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -101,6 +101,8 @@
 {
  script_id(10718); 
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(2889);
  script_cve_id("CVE-2001-0821");
  script_tag(name:"cvss_base", value:"5.0");

Modified: trunk/openvas-plugins/scripts/deb_010_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_010_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_010_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53861);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 010-1 (gnupg)";
  script_name(name);
@@ -73,10 +75,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20010-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20010-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 010-1 (gnupg)";

Modified: trunk/openvas-plugins/scripts/deb_065_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_065_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_065_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53817);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 065-1 (samba)";
  script_name(name);
@@ -61,10 +63,8 @@
 upgrade your samba package immediately.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20065-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20065-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 065-1 (samba)";

Modified: trunk/openvas-plugins/scripts/deb_078_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_078_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_078_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53826);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 078-1 (slrn)";
  script_name(name);
@@ -45,10 +47,8 @@
 this feature.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20078-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20078-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 078-1 (slrn)";

Modified: trunk/openvas-plugins/scripts/deb_1148_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1148_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1148_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(57264);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-2734", "CVE-2006-0330", "CVE-2006-4030");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -64,10 +66,8 @@
 We recommend that you upgrade your gallery package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201148-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201148-1";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1148-1 (gallery)";

Modified: trunk/openvas-plugins/scripts/deb_1201_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1201_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1201_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(57563);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:17:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-4574", "CVE-2006-4805", "CVE-2005-4574");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -60,10 +62,8 @@
 We recommend that you upgrade your ethereal packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201201-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201201-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1201-1 (ethereal)";

Modified: trunk/openvas-plugins/scripts/deb_1313_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1313_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1313_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(58361);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-2948");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -51,10 +53,8 @@
 We recommend that you upgrade your mplayer package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201313-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201313-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1313-1 (mplayer)";

Modified: trunk/openvas-plugins/scripts/deb_1417_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1417_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1417_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(59918);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-6170");
  script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"risk_factor", value:"High");
@@ -50,10 +52,8 @@
 We recommend that you upgrade your asterisk packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201417-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201417-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1417-1 (asterisk)";

Modified: trunk/openvas-plugins/scripts/deb_1440_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1440_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1440_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(60073);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-5037");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your inotify-tools package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201440-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201440-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1440-1 (inotify-tools)";

Modified: trunk/openvas-plugins/scripts/deb_1486_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1486_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1486_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,6 +28,8 @@
 {
  script_id(60293);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-02-05 22:24:57 +0100 (Tue, 05 Feb 2008)");
  script_cve_id("CVE-2007-2808");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -48,10 +50,8 @@
 We recommend that you upgrade your gnatsweb package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201486-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201486-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1486-1 (gnatsweb)";

Modified: trunk/openvas-plugins/scripts/deb_1550_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1550_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1550_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,6 +28,8 @@
 {
  script_id(60797);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-04-21 20:40:14 +0200 (Mon, 21 Apr 2008)");
  script_cve_id("CVE-2008-1614");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -49,10 +51,8 @@
 We recommend that you upgrade your suphp packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201550-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201550-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1550-1 (suphp)";

Modified: trunk/openvas-plugins/scripts/deb_1573_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1573_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1573_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,6 +28,8 @@
 {
  script_id(61023);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-05-27 15:41:50 +0200 (Tue, 27 May 2008)");
  script_cve_id("CVE-2008-1801", "CVE-2008-1802", "CVE-2008-1803");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -69,10 +71,8 @@
 We recommend that you upgrade your rdesktop package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201573-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201573-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1573-1 (rdesktop)";

Modified: trunk/openvas-plugins/scripts/deb_1609_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1609_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1609_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,6 +28,8 @@
 {
  script_id(61357);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-08-15 15:52:52 +0200 (Fri, 15 Aug 2008)");
  script_cve_id("CVE-2008-0983", "CVE-2007-3948");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -64,10 +66,8 @@
 We recommend that you upgrade your lighttpd package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201609-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201609-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1609-1 (lighttpd)";

Modified: trunk/openvas-plugins/scripts/deb_1625_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1625_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1625_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,6 +28,8 @@
 {
  script_id(61377);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-08-15 15:52:52 +0200 (Fri, 15 Aug 2008)");
  script_cve_id("CVE-2008-0053", "CVE-2008-1373", "CVE-2008-1722");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -65,10 +67,8 @@
 We recommend that you upgrade your cupsys package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201625-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201625-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1625-1 (cupsys)";

Modified: trunk/openvas-plugins/scripts/deb_1748_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1748_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1748_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(63679);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-31 19:20:21 +0200 (Tue, 31 Mar 2009)");
  script_cve_id("CVE-2009-0585");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your libsoup packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201748-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201748-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1748-1 (libsoup)";

Modified: trunk/openvas-plugins/scripts/deb_1888_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1888_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1888_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64920);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-21 23:13:00 +0200 (Mon, 21 Sep 2009)");
  script_cve_id("CVE-2009-2409", "CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379", "CVE-2009-1386", "CVE-2009-1387");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
@@ -60,10 +62,8 @@
 We recommend that you upgrade your openssl packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201888-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201888-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1888-1 (openssl, openssl097)");

Modified: trunk/openvas-plugins/scripts/deb_1981_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1981_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_1981_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(66774);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-02-01 18:25:19 +0100 (Mon, 01 Feb 2010)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Debian Security Advisory DSA 1981-1 (maildrop)");
 
@@ -54,10 +56,8 @@
 We recommend that you upgrade your maildrop packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201981-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201981-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 1981-1 (maildrop)");

Modified: trunk/openvas-plugins/scripts/deb_2062_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2062_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_2062_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(67634);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-06 02:35:12 +0200 (Tue, 06 Jul 2010)");
  script_tag(name:"cvss_base", value:"6.2");
  script_cve_id("CVE-2010-1646");
  script_tag(name:"risk_factor", value:"High");
@@ -57,10 +59,8 @@
 We recommend that you upgrade your sudo package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202062-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202062-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2062-1 (sudo)");

Modified: trunk/openvas-plugins/scripts/deb_2219_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2219_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_2219_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(69563);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)");
  script_tag(name:"cvss_base", value:"5.1");
  script_cve_id("CVE-2011-1425");
  script_tag(name:"risk_factor", value:"High");
@@ -54,10 +56,8 @@
 We recommend that you upgrade your xmlsec1 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202219-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202219-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2219-1 (xmlsec1)");

Modified: trunk/openvas-plugins/scripts/deb_2231_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2231_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_2231_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(69729);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-03 04:36:20 +0200 (Wed, 03 Aug 2011)");
  script_cve_id("CVE-2011-1518");
  script_tag(name:"risk_factor", value:"Medium");
  script_tag(name:"cvss_base", value:"4.3");
@@ -54,10 +56,8 @@
 We recommend that you upgrade your otrs2 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202231-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202231-1";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2231-1 (otrs2)");

Modified: trunk/openvas-plugins/scripts/deb_2244_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2244_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_2244_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(69742);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-03 04:36:20 +0200 (Wed, 03 Aug 2011)");
  script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2011-1910");
  script_tag(name:"risk_factor", value:"Medium");
@@ -58,10 +60,8 @@
 We recommend that you upgrade your bind9 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202244-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202244-1";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2244-1 (bind9)");

Modified: trunk/openvas-plugins/scripts/deb_280_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_280_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_280_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53349);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-0201", "CVE-2003-0196");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -65,10 +67,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20280-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20280-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 280-1 (samba)";

Modified: trunk/openvas-plugins/scripts/deb_303_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_303_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_303_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53595);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:36:24 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2003-0073", "CVE-2003-0150");
  script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -62,10 +64,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20303-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20303-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 303-1 (mysql)";

Modified: trunk/openvas-plugins/scripts/deb_434_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_434_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_434_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53132);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0005", "CVE-2004-0006", "CVE-2004-0007", "CVE-2004-0008");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -89,10 +91,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20434-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20434-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 434-1 (gaim)";

Modified: trunk/openvas-plugins/scripts/deb_563_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_563_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_563_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53253);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(11347);
  script_cve_id("CVE-2004-0884");
  script_tag(name:"cvss_base", value:"7.2");
@@ -55,10 +57,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20563-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20563-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 563-1 (cyrus-sasl)";

Modified: trunk/openvas-plugins/scripts/deb_577_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_577_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_577_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53269);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(11295);
  script_cve_id("CVE-2004-0977");
  script_tag(name:"cvss_base", value:"2.1");
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20577-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20577-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 577-1 (postgresql)";

Modified: trunk/openvas-plugins/scripts/deb_643_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_643_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_643_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53478);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0555");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -49,10 +51,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20643-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20643-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 643-1 (queue)";

Modified: trunk/openvas-plugins/scripts/deb_689_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_689_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_689_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53519);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(12519);
  script_cve_id("CVE-2005-0088");
  script_tag(name:"cvss_base", value:"7.5");
@@ -54,10 +56,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20689-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20689-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 689-1 (libapache-mod-python)";

Modified: trunk/openvas-plugins/scripts/deb_730_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_730_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_730_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(53559);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(12954);
  script_cve_id("CVE-2005-0953");
  script_tag(name:"cvss_base", value:"3.7");
@@ -56,10 +58,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20730-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20730-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 730-1 (bzip2)";

Modified: trunk/openvas-plugins/scripts/deb_766_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_766_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_766_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(54447);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-2320");
  script_bugtraq_id(14072);
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your webcalendar package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20766-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20766-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 766-1 (webcalendar)";

Modified: trunk/openvas-plugins/scripts/deb_827_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_827_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_827_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(55496);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 827-1 (backupninja)";
  script_name(name);
@@ -49,10 +51,8 @@
 We recommend that you upgrade your backupninja package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20827-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20827-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 827-1 (backupninja)";

Modified: trunk/openvas-plugins/scripts/deb_848_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_848_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_848_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(55561);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-2662", "CVE-2005-2663");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -63,10 +65,8 @@
 We recommend that you upgrade your masqmail package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20848-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20848-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 848-1 (masqmail)";

Modified: trunk/openvas-plugins/scripts/deb_967_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_967_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_967_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(56252);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-4439", "CVE-2006-0347", "CVE-2006-0348", "CVE-2006-0597", "CVE-2006-0598", "CVE-2006-0599", "CVE-2006-0600", "CVE-2005-4439");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -88,10 +90,8 @@
 We recommend that you upgrade your elog package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20967-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20967-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 967-1 (elog)";

Modified: trunk/openvas-plugins/scripts/deb_991_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_991_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/deb_991_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(56398);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-0855");
  script_bugtraq_id(16790);
  script_tag(name:"cvss_base", value:"5.1");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your zoo package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20991-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20991-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 991-1 (zoo)";

Modified: trunk/openvas-plugins/scripts/fcore_2008_11736.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2008_11736.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2008_11736.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(63089);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-02 18:22:54 +0100 (Fri, 02 Jan 2009)");
  script_cve_id("CVE-2007-4829");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -67,10 +69,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-11736
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-11736";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2008-11736 (perl)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_10718.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10718.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_10718.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(66127);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-10718 (sahana)");
 
@@ -52,10 +54,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10718
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10718";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-10718 (sahana)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_1343.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1343.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_1343.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(63453);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-02 19:11:09 +0100 (Mon, 02 Mar 2009)");
  script_cve_id("CVE-2009-0386", "CVE-2009-0387");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1343
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1343";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-1343 (gstreamer-plugins-good)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_1523.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1523.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_1523.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(63386);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-13 20:43:17 +0100 (Fri, 13 Feb 2009)");
  script_tag(name:"risk_factor", value:"High");
  name = "Fedora Core 10 FEDORA-2009-1523 (squidGuard)";
  script_name(name);
@@ -52,10 +54,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1523
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1523";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-1523 (squidGuard)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_3433.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3433.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_3433.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(63781);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_cve_id("CVE-2009-0385", "CVE-2009-1274");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -79,10 +81,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3433
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3433";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-3433 (xine-lib)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_4875.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4875.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_4875.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(63986);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-20 00:17:15 +0200 (Wed, 20 May 2009)");
  script_cve_id("CVE-2009-1579", "CVE-2009-1580", "CVE-2009-1581", "CVE-2009-1578");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -61,10 +63,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4875
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4875";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 11 FEDORA-2009-4875 (squirrelmail)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_5568.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5568.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_5568.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64082);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2007-2807", "CVE-2009-1789");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -63,10 +65,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5568
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5568";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-5568 (eggdrop)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_5773.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5773.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_5773.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64105);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)");
  script_cve_id("CVE-2009-1769");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -64,10 +66,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5773
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5773";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-5773 (ocsinventory)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_8477.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8477.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_8477.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64857);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-15 22:46:32 +0200 (Tue, 15 Sep 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-8477 (puppet)");
 
@@ -60,10 +62,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8477
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8477";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-8477 (puppet)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_8487.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8487.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_8487.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64624);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 10 FEDORA-2009-8487 (wordpress)");
 
@@ -67,10 +69,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8487
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8487";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-8487 (wordpress)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_8611.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_8611.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/fcore_2009_8611.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(64743);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Fedora Core 11 FEDORA-2009-8611 (htmldoc)");
 
@@ -59,10 +61,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8611
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8611";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Fedora Core 11 FEDORA-2009-8611 (htmldoc)");

Modified: trunk/openvas-plugins/scripts/freebsd_bind98.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bind98.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_bind98.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(69994);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-03 04:36:20 +0200 (Wed, 03 Aug 2011)");
  script_cve_id("CVE-2011-2465");
  script_tag(name:"risk_factor", value:"Medium");
  script_tag(name:"cvss_base", value:"2.6");
@@ -52,10 +54,8 @@
 software upgrades.
 
 https://www.isc.org/software/bind/advisories/cve-2011-2465
-http://www.vuxml.org/freebsd/4ccee784-a721-11e0-89b4-001ec9578670.html
+http://www.vuxml.org/freebsd/4ccee784-a721-11e0-89b4-001ec9578670.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: bind98");

Modified: trunk/openvas-plugins/scripts/freebsd_bugzilla10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bugzilla10.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_bugzilla10.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(67714);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-22 17:43:43 +0200 (Thu, 22 Jul 2010)");
  script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2010-1204", "CVE-2010-0180");
  script_tag(name:"risk_factor", value:"Medium");
@@ -59,10 +61,8 @@
 
 https://bugzilla.mozilla.org/show_bug.cgi?id=309952
 https://bugzilla.mozilla.org/show_bug.cgi?id=561797
-http://www.vuxml.org/freebsd/f1331504-8849-11df-89b8-00151735203a.html
+http://www.vuxml.org/freebsd/f1331504-8849-11df-89b8-00151735203a.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: bugzilla");

Modified: trunk/openvas-plugins/scripts/freebsd_cups-base0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cups-base0.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_cups-base0.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(52232);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-1267");
  script_bugtraq_id(11968);
  script_tag(name:"cvss_base", value:"6.5");
@@ -54,10 +56,8 @@
 
 http://tigger.uic.edu/~jlongs2/holes/cups.txt
 http://www.cups.org/str.php?L1024
-http://www.vuxml.org/freebsd/40a3bca2-6809-11d9-a9e7-0001020eed82.html
+http://www.vuxml.org/freebsd/40a3bca2-6809-11d9-a9e7-0001020eed82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: cups-base, fr-cups-base";

Modified: trunk/openvas-plugins/scripts/freebsd_curl3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_curl3.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_curl3.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(67287);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-04-21 03:31:17 +0200 (Wed, 21 Apr 2010)");
  script_cve_id("CVE-2010-0734");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -55,10 +57,8 @@
 http://curl.haxx.se/docs/adv_20100209.html
 http://www.debian.org/security/2010/dsa-2023
 http://www.openwall.com/lists/oss-security/2010/02/09/5
-http://www.vuxml.org/freebsd/c8c31c41-49ed-11df-83fb-0015587e2cc1.html
+http://www.vuxml.org/freebsd/c8c31c41-49ed-11df-83fb-0015587e2cc1.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: curl");

Modified: trunk/openvas-plugins/scripts/freebsd_dojo.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_dojo.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_dojo.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(67295);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-04-21 03:31:17 +0200 (Wed, 21 Apr 2010)");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: dojo");
 
@@ -47,10 +49,8 @@
 http://packetstormsecurity.org/1003-exploits/dojo-xss.txt
 http://secunia.com/advisories/38964
 http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/
-http://www.vuxml.org/freebsd/805603a1-3e7a-11df-a5a1-0050568452ac.html
+http://www.vuxml.org/freebsd/805603a1-3e7a-11df-a5a1-0050568452ac.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: dojo");

Modified: trunk/openvas-plugins/scripts/freebsd_drupal50.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_drupal50.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_drupal50.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(58821);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: drupal5";
  script_name(name);
@@ -46,10 +48,8 @@
 
 http://drupal.org/node/162360
 http://secunia.com/advisories/26224/
-http://www.vuxml.org/freebsd/98dd7788-3d13-11dc-b3d3-0016179b2dd5.html
+http://www.vuxml.org/freebsd/98dd7788-3d13-11dc-b3d3-0016179b2dd5.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: drupal5";

Modified: trunk/openvas-plugins/scripts/freebsd_ffmpeg.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ffmpeg.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_ffmpeg.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(55969);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: ffmpeg";
  script_name(name);
@@ -44,10 +46,8 @@
 
 http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
 http://secunia.com/advisories/17892/
-http://www.vuxml.org/freebsd/964161cd-6715-11da-99f6-00123ffe8333.html
+http://www.vuxml.org/freebsd/964161cd-6715-11da-99f6-00123ffe8333.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: ffmpeg";

Modified: trunk/openvas-plugins/scripts/freebsd_freeradius1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_freeradius1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_freeradius1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(56525);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(17171);
  script_cve_id("CVE-2006-1354");
  script_tag(name:"cvss_base", value:"7.5");
@@ -53,10 +55,8 @@
 
 http://www.freeradius.org/security.html#1.1.0
 http://secunia.com/advisories/19300/
-http://www.vuxml.org/freebsd/37a5c10f-bf56-11da-b0e9-00123ffe8333.html
+http://www.vuxml.org/freebsd/37a5c10f-bf56-11da-b0e9-00123ffe8333.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: freeradius";

Modified: trunk/openvas-plugins/scripts/freebsd_gd0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gd0.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_gd0.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(58836);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-3472", "CVE-2007-3473", "CVE-2007-3474", "CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2007-3478");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -56,10 +58,8 @@
 http://bugs.libgd.org/?do=details&task_id=74
 http://bugs.libgd.org/?do=details&task_id=48
 http://bugs.php.net/bug.php?id=40578
-http://www.vuxml.org/freebsd/6e099997-25d8-11dc-878b-000c29c5647f.html
+http://www.vuxml.org/freebsd/6e099997-25d8-11dc-878b-000c29c5647f.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: gd";

Modified: trunk/openvas-plugins/scripts/freebsd_gnupg6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gnupg6.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_gnupg6.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(57673);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-6235");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -46,10 +48,8 @@
 
 http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000246.html
 http://secunia.com/advisories/23245/
-http://www.vuxml.org/freebsd/4db1669c-8589-11db-ac4f-02e081235dab.html
+http://www.vuxml.org/freebsd/4db1669c-8589-11db-ac4f-02e081235dab.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: gnupg";

Modified: trunk/openvas-plugins/scripts/freebsd_gnutls5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gnutls5.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_gnutls5.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(64786);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_cve_id("CVE-2009-2730");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -56,10 +58,8 @@
 
 http://article.gmane.org/gmane.network.gnutls.general/1733
 http://secunia.com/advisories/36266
-http://www.vuxml.org/freebsd/856a6f84-8b30-11de-8062-00e0815b8da8.html
+http://www.vuxml.org/freebsd/856a6f84-8b30-11de-8062-00e0815b8da8.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: gnutls");

Modified: trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_ipsec-tools.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(63280);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)");
  script_cve_id("CVE-2008-3651", "CVE-2008-3652");
  script_bugtraq_id(30657);
  script_tag(name:"cvss_base", value:"7.8");
@@ -58,10 +60,8 @@
 software upgrades.
 
 http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2
-http://www.vuxml.org/freebsd/abcacb5a-e7f1-11dd-afcd-00e0815b8da8.html
+http://www.vuxml.org/freebsd/abcacb5a-e7f1-11dd-afcd-00e0815b8da8.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: ipsec-tools";

Modified: trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(70247);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2011-2696");
  script_tag(name:"risk_factor", value:"High");
@@ -51,10 +53,8 @@
 software upgrades.
 
 http://secunia.com/advisories/45125/
-http://www.vuxml.org/freebsd/b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6.html
+http://www.vuxml.org/freebsd/b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: libsndfile");

Modified: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin5.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin5.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(66523);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-14 23:06:43 +0100 (Mon, 14 Dec 2009)");
  script_cve_id("CVE-2009-3794", "CVE-2009-3796", "CVE-2009-3797", "CVE-2009-3798", "CVE-2009-3799", "CVE-2009-3800", "CVE-2009-3951");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -50,10 +52,8 @@
 http://www.zerodayinitiative.com/advisories/ZDI-09-092/
 http://www.zerodayinitiative.com/advisories/ZDI-09-093/
 http://www.adobe.com/support/security/bulletins/apsb09-19.html
-http://www.vuxml.org/freebsd/3c1a672e-e508-11de-9f4a-001b2134ef46.html
+http://www.vuxml.org/freebsd/3c1a672e-e508-11de-9f4a-001b2134ef46.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: linux-flashplugin");

Modified: trunk/openvas-plugins/scripts/freebsd_linux-gdk-pixbuf.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-gdk-pixbuf.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_linux-gdk-pixbuf.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(52385);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0782", "CVE-2004-0783", "CVE-2004-0788");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -69,10 +71,8 @@
 software upgrades.
 
 http://scary.beasts.org/security/CESA-2004-005.txt
-http://www.vuxml.org/freebsd/3d1e9267-073f-11d9-b45d-000c41e2cdad.html
+http://www.vuxml.org/freebsd/3d1e9267-073f-11d9-b45d-000c41e2cdad.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: linux-gdk-pixbuf";

Modified: trunk/openvas-plugins/scripts/freebsd_mod_python0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mod_python0.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_mod_python0.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(52502);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2003-0973");
  script_bugtraq_id(9129);
  script_tag(name:"cvss_base", value:"5.0");
@@ -52,10 +54,8 @@
 
 http://www.modpython.org/pipermail/mod_python/2003-November/014532.html
 http://www.modpython.org/pipermail/mod_python/2004-January/014879.html
-http://www.vuxml.org/freebsd/1a448eb7-6988-11d8-873f-0020ed76ef5a.html
+http://www.vuxml.org/freebsd/1a448eb7-6988-11d8-873f-0020ed76ef5a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mod_python";

Modified: trunk/openvas-plugins/scripts/freebsd_openoffice.org0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openoffice.org0.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_openoffice.org0.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(68949);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-05 22:25:39 +0100 (Sat, 05 Mar 2011)");
  script_tag(name:"risk_factor", value:"High");
  script_name("FreeBSD Ports: openoffice.org");
 
@@ -44,10 +46,8 @@
 
 http://www.openoffice.org/security/bulletin.html
 http://secunia.com/advisories/40775/
-http://www.vuxml.org/freebsd/f2b43905-3545-11e0-8e81-0022190034c0.html
+http://www.vuxml.org/freebsd/f2b43905-3545-11e0-8e81-0022190034c0.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: openoffice.org");

Modified: trunk/openvas-plugins/scripts/freebsd_pam_smb.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pam_smb.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_pam_smb.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(52538);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2003-0686");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -50,10 +52,8 @@
 software upgrades.
 
 http://www.skynet.ie/~airlied/pam_smb/
-http://www.vuxml.org/freebsd/2bcd2d24-24ca-11d8-82e5-0020ed76ef5a.html
+http://www.vuxml.org/freebsd/2bcd2d24-24ca-11d8-82e5-0020ed76ef5a.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: pam_smb";

Modified: trunk/openvas-plugins/scripts/freebsd_pcre1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pcre1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_pcre1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(60532);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2008-0674");
  script_bugtraq_id(27786);
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://pcre.org/changelog.txt
-http://www.vuxml.org/freebsd/f9e96930-e6df-11dc-8c6a-00304881ac9a.html
+http://www.vuxml.org/freebsd/f9e96930-e6df-11dc-8c6a-00304881ac9a.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: pcre";

Modified: trunk/openvas-plugins/scripts/freebsd_peercast.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_peercast.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_peercast.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(60054);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: peercast";
  script_name(name);
@@ -44,10 +46,8 @@
 
 http://aluigi.altervista.org/adv/peercasthof-adv.txt
 http://secunia.com/advisories/28120/
-http://www.vuxml.org/freebsd/31435fbc-ae73-11dc-a5f9-001a4d49522b.html
+http://www.vuxml.org/freebsd/31435fbc-ae73-11dc-a5f9-001a4d49522b.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: peercast";

Modified: trunk/openvas-plugins/scripts/freebsd_php54.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php54.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_php54.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(62852);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-12-10 05:23:56 +0100 (Wed, 10 Dec 2008)");
  script_cve_id("CVE-2008-2371", "CVE-2008-2829", "CVE-2008-3658", "CVE-2008-3659", "CVE-2008-3660");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -81,10 +83,8 @@
 http://secunia.com/advisories/30916/
 http://secunia.com/advisories/31409/
 http://secunia.com/advisories/32964/
-http://www.vuxml.org/freebsd/27d01223-c457-11dd-a721-0030843d3802.html
+http://www.vuxml.org/freebsd/27d01223-c457-11dd-a721-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: php5";

Modified: trunk/openvas-plugins/scripts/freebsd_postnuke.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postnuke.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_postnuke.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(52164);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0617", "CVE-2005-0615");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -57,10 +59,8 @@
 http://news.postnuke.com/Article2669.html
 http://marc.theaimsgroup.com/?l=bugtraq&m=110962710805864
 http://marc.theaimsgroup.com/?l=bugtraq&m=110962819232255
-http://www.vuxml.org/freebsd/f3eec2b5-8cd8-11d9-8066-000a95bc6fae.html
+http://www.vuxml.org/freebsd/f3eec2b5-8cd8-11d9-8066-000a95bc6fae.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: postnuke";

Modified: trunk/openvas-plugins/scripts/freebsd_rxvt-unicode0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_rxvt-unicode0.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_rxvt-unicode0.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(56066);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: rxvt-unicode";
  script_name(name);
@@ -43,10 +45,8 @@
 software upgrades.
 
 http://dist.schmorp.de/rxvt-unicode/Changes
-http://www.vuxml.org/freebsd/c2fdb3bc-7d72-11da-b96e-000fb586ba73.html
+http://www.vuxml.org/freebsd/c2fdb3bc-7d72-11da-b96e-000fb586ba73.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: rxvt-unicode";

Modified: trunk/openvas-plugins/scripts/freebsd_squid0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_squid0.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_squid0.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(52196);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(12412);
  script_cve_id("CVE-2005-0241");
  script_tag(name:"cvss_base", value:"5.0");
@@ -54,10 +56,8 @@
 
 http://www.squid-cache.org/bugs/show_bug.cgi?id=1216
 http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-oversize_reply_headers.patch
-http://www.vuxml.org/freebsd/bfda39de-7467-11d9-9e1e-c296ac722cb3.html
+http://www.vuxml.org/freebsd/bfda39de-7467-11d9-9e1e-c296ac722cb3.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: squid";

Modified: trunk/openvas-plugins/scripts/freebsd_squid12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_squid12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_squid12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(52488);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(9778);
  script_cve_id("CVE-2004-0189");
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://www.squid-cache.org/Advisories/SQUID-2004_1.txt
-http://www.vuxml.org/freebsd/705e003a-7f36-11d8-9645-0020ed76ef5a.html
+http://www.vuxml.org/freebsd/705e003a-7f36-11d8-9645-0020ed76ef5a.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: squid";

Modified: trunk/openvas-plugins/scripts/freebsd_suphp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_suphp.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_suphp.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(60838);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2008-1614");
  script_bugtraq_id(28568);
  script_tag(name:"cvss_base", value:"4.3");
@@ -46,10 +48,8 @@
 software upgrades.
 
 http://lists.marsching.biz/pipermail/suphp/2008-March/001750.html
-http://www.vuxml.org/freebsd/fb672330-02db-11dd-bd06-0017319806e7.html
+http://www.vuxml.org/freebsd/fb672330-02db-11dd-bd06-0017319806e7.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: suphp";

Modified: trunk/openvas-plugins/scripts/freebsd_tcpdump2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tcpdump2.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_tcpdump2.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(58815);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-3798");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -44,11 +46,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: tcpdump";

Modified: trunk/openvas-plugins/scripts/freebsd_webcalendar.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_webcalendar.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsd_webcalendar.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  script_id(55637);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: webcalendar";
  script_name(name);
@@ -43,10 +45,8 @@
 software upgrades.
 
 http://sourceforge.net/forum/forum.php?thread_id=1342085&forum_id=11587
-http://www.vuxml.org/freebsd/60f8fe7b-3cfb-11da-baa2-0004614cc33d.html
+http://www.vuxml.org/freebsd/60f8fe7b-3cfb-11da-baa2-0004614cc33d.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: webcalendar";

Modified: trunk/openvas-plugins/scripts/freebsdsa_ntpd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_ntpd.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/freebsdsa_ntpd.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,6 +30,8 @@
 {
  script_id(63242);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)");
  script_cve_id("CVE-2009-0021");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -59,8 +61,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-09:03.ntpd.asc
-Risk factor: Medium";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-09:03.ntpd.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/ftpglob.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ftpglob.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ftpglob.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,6 +29,8 @@
 {
  	script_id(10821);
  	script_version("$Revision$");
+ 	script_tag(name:"last_modification", value:"$Date$");
+ 	script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
     script_xref(name:"IAVA", value:"2001-b-0004");
  	script_bugtraq_id(2550, 3581);
 	script_cve_id("CVE-2001-0249", "CVE-2001-0550");
@@ -48,8 +50,7 @@
 attacker may be able to execute arbitrary code with the privileges of FTPD, 
 typically root.
 
-Solution : Contact your vendor for a fix
-Risk factor: Critical";
+Solution : Contact your vendor for a fix";
 
  	script_description( desc);
  	script_summary( "Check if the remote FTPD s vulnerable to a glob heap corruption vulnerability");

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0059_libsmi_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0059_libsmi_centos3_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0059_libsmi_centos3_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880091);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0059");
@@ -61,10 +63,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-January/014631.html
+  http://lists.centos.org/pipermail/centos-announce/2008-January/014631.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of libsmi");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0059_libsmi_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0176_openoffice.org_centos3_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0176_openoffice.org_centos3_x86_64.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0176_openoffice.org_centos3_x86_64.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880020);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0176");
@@ -61,10 +63,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-April/014825.html
+  http://lists.centos.org/pipermail/centos-announce/2008-April/014825.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0176_openoffice.org_centos3_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0516_evolution_centos3_x86_64.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0516_evolution_centos3_x86_64.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0516_evolution_centos3_x86_64.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880107);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.6");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0516");
@@ -57,10 +59,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-June/014963.html
+  http://lists.centos.org/pipermail/centos-announce/2008-June/014963.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of evolution");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0516_evolution_centos3_x86_64.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0965-01_lynx_centos2_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0965-01_lynx_centos2_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0965-01_lynx_centos2_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880143);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0965-01");
@@ -62,10 +64,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-October/015360.html
+  http://lists.centos.org/pipermail/centos-announce/2008-October/015360.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of lynx");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0965-01_lynx_centos2_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0431_kdegraphics_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0431_kdegraphics_centos4_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0431_kdegraphics_centos4_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880934);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:0431");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0431_kdegraphics_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0437_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0437_seamonkey_centos4_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0437_seamonkey_centos4_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880902);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:0437");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0437_seamonkey_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_1061_freetype_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_1061_freetype_centos5_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_1061_freetype_centos5_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880811);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2009:1061");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_1061_freetype_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0153_thunderbird_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0153_thunderbird_centos5_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0153_thunderbird_centos5_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880629);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0153");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0153_thunderbird_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0578_freetype_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0578_freetype_centos5_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0578_freetype_centos5_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880576);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2010:0578");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0578_freetype_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0977_openssl_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0977_openssl_centos4_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0977_openssl_centos4_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880460);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-31 15:15:14 +0100 (Mon, 31 Jan 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0977");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0977_openssl_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2011_0477_gstreamer-plugins_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_0477_gstreamer-plugins_centos4_i386.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_0477_gstreamer-plugins_centos4_i386.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880532);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2011:0477");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2011_0477_gstreamer-plugins_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_PhreeBooks_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_PhreeBooks_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_PhreeBooks_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -38,7 +38,9 @@
  
  script_tag(name:"risk_factor", value:"None");
  script_id(100669);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-06-10 10:47:44 +0200 (Thu, 10 Jun 2010)");
 
  script_name("PhreeBooks Detection");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_PhreeBooks_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103310);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-10-24 14:18:38 +0200 (Mon, 24 Oct 2011)");
  script_bugtraq_id(50309);
- script_version ("$Revision$");
 
  script_name("PreProjects Pre Studio Business Cards Designer 'page.php' SQL Injection Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0059-01_wireshark.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0059-01_wireshark.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0059-01_wireshark.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870085);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2008:0059-01");
@@ -63,10 +65,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-January/msg00015.html
+  https://www.redhat.com/archives/rhsa-announce/2008-January/msg00015.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of wireshark");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0059-01_wireshark.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2008_0863-01_libtiff.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2008_0863-01_libtiff.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2008_0863-01_libtiff.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870048);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2008:0863-01");
@@ -62,10 +64,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2008-August/msg00027.html
+  https://www.redhat.com/archives/rhsa-announce/2008-August/msg00027.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libtiff");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2008_0863-01_libtiff.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0061-02_gzip.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0061-02_gzip.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0061-02_gzip.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870211);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-25 13:25:54 +0100 (Mon, 25 Jan 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2010:0061-02");
@@ -63,10 +65,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/rhsa-announce/2010-January/msg00017.html
+  https://www.redhat.com/archives/rhsa-announce/2010-January/msg00017.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of gzip");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0061-02_gzip.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0678-01_rpm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0678-01_rpm.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0678-01_rpm.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870316);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 14:21:00 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2010:0678-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0678-01_rpm.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0792-01_kernel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0792-01_kernel.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0792-01_kernel.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870349);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2010:0792-01");
   script_tag(name:"cvss_base", value:"7.2");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0792-01_kernel.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(870472);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)");
   script_tag(name:"cvss_base", value:"10.0");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:1164-01");
   script_cve_id("CVE-2011-0084", "CVE-2011-2378", "CVE-2011-2981", "CVE-2011-2982", "CVE-2011-2983", "CVE-2011-2984");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_1164-01_firefox.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_1220-01_samba3x.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1220-01_samba3x.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1220-01_samba3x.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870475);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-07 08:58:04 +0200 (Wed, 07 Sep 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2011:1220-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_1220-01_samba3x.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl 2945 2009-06-15 13:17:58Z jun $
+# $Id$
 #
 # Adobe Reader/Acrobat Multiple BOF Vulnerabilities - Jun09 (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800585);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-16 15:11:01 +0200 (Tue, 16 Jun 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0198", "CVE-2009-0509", "CVE-2009-0510",
@@ -68,8 +70,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Adobe Reader/Acrobat");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_prdts_mult_bof_vuln_jun09_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_reader_dos_vuln_may09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_reader_dos_vuln_may09_lin.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_adobe_reader_dos_vuln_may09_lin.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ##############################################i#################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_reader_dos_vuln_may09_lin.nasl 2116 2009-05-04 18:50:29Z may $
+# $Id$
 #
 # Adobe Reader Denial of Service Vulnerability (May09)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800701);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-11 08:41:11 +0200 (Mon, 11 May 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-1493", "CVE-2009-1492");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 8.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.4";
 
   script_description(desc);
   script_summary("Check for the version of Adobe Reader");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_reader_dos_vuln_may09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apache_axis2_40976.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apache_axis2_40976.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_apache_axis2_40976.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100814);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-09-20 15:31:27 +0200 (Mon, 20 Sep 2010)");
  script_bugtraq_id(40976);
  script_tag(name:"cvss_base", value:"7.5");
   script_cve_id("CVE-2010-1632");
- script_version ("1.0-$Revision$");
 
  script_name("Apache Axis2 Document Type Declaration Processing Security Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_apache_axis2_40976.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apache_tomcat_45015.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apache_tomcat_45015.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_apache_tomcat_45015.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(103032);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-14 14:24:22 +0100 (Fri, 14 Jan 2011)");
  script_bugtraq_id(45015);
  script_tag(name:"cvss_base", value:"4.3");
   script_cve_id("CVE-2010-4172");
- script_version ("1.0-$Revision$");
 
  script_name("Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_apache_tomcat_45015.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_bournal_privilege_escalation_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_bournal_privilege_escalation_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_bournal_privilege_escalation_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_bournal_privilege_escalation_vuln.nasl 7435 2010-03-02 17:20:29 mar $
+# $Id$
 #
 # Bournal Privilege Escalation Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800730);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-05 10:09:57 +0100 (Fri, 05 Mar 2010)");
   script_tag(name:"cvss_base", value:"3.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_bugtraq_id(38353);
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score      : 3.3 (AV:L/AC:M/Au:NR/C:N/I:P/A:P)
-    CVSS Temporal Score  : 2.5
-  Risk factor : Medium";
+    CVSS Temporal Score  : 2.5";
 
   script_description(desc);
   script_summary("Check for the version of Bournal");


Property changes on: trunk/openvas-plugins/scripts/gb_bournal_privilege_escalation_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_cups_guest_acc_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_cups_guest_acc_dos_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_cups_guest_acc_dos_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_cups_guest_acc_dos_vuln.nasl 0517 2008-11-21 17:05:50Z nov $
+# $Id$
 #
 # CUPS Subscription Incorrectly uses Guest Account DoS Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800142);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-11-26 16:25:46 +0100 (Wed, 26 Nov 2008)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2008-5183", "CVE-2008-5184");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.4
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.4";
 
   script_description(desc);
   script_summary("Check for the Version of CUPS service");


Property changes on: trunk/openvas-plugins/scripts/gb_cups_guest_acc_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_diy_cms_mult_rfi_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_diy_cms_mult_rfi_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_diy_cms_mult_rfi_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_diy_cms_mult_rfi_vuln.nasl 10965 2010-09- 13:13:29 sep $
+# $Id$
 #
 # DiY-CMS  Multiple Remote File Inclusion Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801512);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 16:37:50 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2010-3206");


Property changes on: trunk/openvas-plugins/scripts/gb_diy_cms_mult_rfi_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2060_snort_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2060_snort_fc7.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2060_snort_fc7.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861388);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2007-2060");
@@ -75,10 +77,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00122.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00122.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of snort");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2060_snort_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_219_samba_fc5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_219_samba_fc5.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_219_samba_fc5.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861240);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-219");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-February/msg00032.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-February/msg00032.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of samba");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_219_samba_fc5.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2668_blam_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2668_blam_fc7.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2668_blam_fc7.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861354);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-2668");
   script_name( "Fedora Update for blam FEDORA-2007-2668");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00358.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00358.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of blam");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2668_blam_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2985_kdewebdev_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2985_kdewebdev_fc7.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2985_kdewebdev_fc7.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861229);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2007-2985");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00313.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00313.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of kdewebdev");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2985_kdewebdev_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_3952_epiphany_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_3952_epiphany_fc7.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_3952_epiphany_fc7.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861527);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2007-3952");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01019.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01019.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of epiphany");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_3952_epiphany_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_4461_e2fsprogs_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_4461_e2fsprogs_fc7.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_4461_e2fsprogs_fc7.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860271);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-24 14:29:46 +0100 (Tue, 24 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-4461");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00629.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00629.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of e2fsprogs");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_4461_e2fsprogs_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_582_spamassassin_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_582_spamassassin_fc6.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_582_spamassassin_fc6.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861172);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"1.9");
   script_tag(name:"risk_factor", value:"Low");
   script_xref(name: "FEDORA", value: "2007-582");
@@ -58,10 +60,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-June/msg00214.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-June/msg00214.html";
 
-  Risk factor: Low";
-
   script_description(desc);
   script_summary("Check for the Version of spamassassin");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_582_spamassassin_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_2229_phpMyAdmin_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_2229_phpMyAdmin_fc7.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_2229_phpMyAdmin_fc7.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860206);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:22:52 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-2229");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00100.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00100.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of phpMyAdmin");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_2229_phpMyAdmin_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_6127_devhelp_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_6127_devhelp_fc8.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_6127_devhelp_fc8.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860673);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:01:32 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-6127");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00195.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00195.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of devhelp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_6127_devhelp_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_6415_drupal_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_6415_drupal_fc9.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_6415_drupal_fc9.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860902);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:01:32 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-6415");
   script_name( "Fedora Update for drupal FEDORA-2008-6415");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of drupal");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_6415_drupal_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_7269_xastir_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_7269_xastir_fc8.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_7269_xastir_fc8.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860991);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:03:12 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-7269");
   script_name( "Fedora Update for xastir FEDORA-2008-7269");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00199.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00199.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of xastir");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_7269_xastir_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_9669_gnome-python2-extras_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_9669_gnome-python2-extras_fc9.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_9669_gnome-python2-extras_fc9.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860237);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:07:33 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-9669");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00394.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00394.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of gnome-python2-extras");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_9669_gnome-python2-extras_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_10369_w3m_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_10369_w3m_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_10369_w3m_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862264);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-07-23 16:10:25 +0200 (Fri, 23 Jul 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-10369");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_10369_w3m_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_11152_mipv6-daemon_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_11152_mipv6-daemon_fc13.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_11152_mipv6-daemon_fc13.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862327);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-20 14:57:11 +0200 (Fri, 20 Aug 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-11152");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_11152_mipv6-daemon_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_13155_libHX_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_13155_libHX_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_13155_libHX_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862378);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-07 15:09:12 +0200 (Tue, 07 Sep 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-13155");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_13155_libHX_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14634_cabextract_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14634_cabextract_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14634_cabextract_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862441);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-01 16:10:21 +0200 (Fri, 01 Oct 2010)");
   script_tag(name:"cvss_base", value:"5.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-14634");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14634_cabextract_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_14678_samba_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_14678_samba_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_14678_samba_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862419);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-22 08:32:53 +0200 (Wed, 22 Sep 2010)");
   script_tag(name:"cvss_base", value:"8.5");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-14678");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_14678_samba_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_15520_nss-softokn_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_15520_nss-softokn_fc13.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_15520_nss-softokn_fc13.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862488);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-15520");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_15520_nss-softokn_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_17133_pam_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_17133_pam_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_17133_pam_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(862556);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-23 15:30:07 +0100 (Tue, 23 Nov 2010)");
   script_tag(name:"cvss_base", value:"6.9");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-17133");
   script_cve_id("CVE-2010-3316", "CVE-2010-3435", "CVE-2010-3853");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_17133_pam_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1936_galeon_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1936_galeon_fc11.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1936_galeon_fc11.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861701);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-1936");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035364.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035364.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of galeon");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1936_galeon_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_5535_dsniff_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_5535_dsniff_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_5535_dsniff_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861836);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-5535");
   script_name("Fedora Update for dsniff FEDORA-2010-5535");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038375.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038375.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of dsniff");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_5535_dsniff_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_5535_libnids_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_5535_libnids_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_5535_libnids_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861846);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-5535");
   script_name("Fedora Update for libnids FEDORA-2010-5535");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038374.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038374.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libnids");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_5535_libnids_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_7844_html2ps_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_7844_html2ps_fc12.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_7844_html2ps_fc12.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861968);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-7844");
   script_name("Fedora Update for html2ps FEDORA-2010-7844");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_7844_html2ps_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_10781_vips_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10781_vips_fc14.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10781_vips_fc14.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863451);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-27 16:37:49 +0200 (Sat, 27 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-10781");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_10781_vips_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_11936_ecryptfs-utils_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11936_ecryptfs-utils_fc15.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11936_ecryptfs-utils_fc15.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863505);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-16 17:22:17 +0200 (Fri, 16 Sep 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-11936");
   script_cve_id("CVE-2011-3145", "CVE-2011-1831", "CVE-2011-1832", "CVE-2011-1833", "CVE-2011-1834", "CVE-2011-1835", "CVE-2011-1836", "CVE-2011-1837");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_11936_ecryptfs-utils_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863501);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-12 16:29:49 +0200 (Mon, 12 Sep 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-12350");
   script_name("Fedora Update for audacious-plugins FEDORA-2011-12350");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_12350_audacious-plugins_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_14022_radvd_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_14022_radvd_fc15.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_14022_radvd_fc15.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863601);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-31 13:45:00 +0100 (Mon, 31 Oct 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-14022");
   script_cve_id("CVE-2011-3601", "CVE-2011-3602", "CVE-2011-3603", "CVE-2011-3604", "CVE-2011-360", "CVE-2011-3605");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_14022_radvd_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_3627_openldap_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_3627_openldap_fc14.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_3627_openldap_fc14.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863542);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-27 17:29:53 +0200 (Tue, 27 Sep 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-3627");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_3627_openldap_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdebase_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdebase_fc14.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdebase_fc14.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863015);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-5200");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_5200_kdebase_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8076_oprofile_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8076_oprofile_fc15.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8076_oprofile_fc15.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863368);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-27 14:47:11 +0200 (Wed, 27 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-8076");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8076_oprofile_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_9690_glpi-mass-ocs-import_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_9690_glpi-mass-ocs-import_fc14.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_9690_glpi-mass-ocs-import_fc14.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863419);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-18 14:57:45 +0200 (Thu, 18 Aug 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-9690");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_9690_glpi-mass-ocs-import_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_flock_detect_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_flock_detect_lin.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_flock_detect_lin.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_flock_detect_lin.nasl 4375 2009-08-31 18:02:24Z aug $
+# $Id$
 #
 # Flock Version Detection (Linux)
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(800878);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-02 11:50:45 +0200 (Wed, 02 Sep 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Flock Version Detection (Linux)");
   desc = "
   Overview: This script detects the installed version of Flock Browser and
-  sets the result in KB.
+  sets the result in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of Flock Browser");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_flock_detect_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_freeSSHd_38887.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_freeSSHd_38887.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_freeSSHd_38887.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100547);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-03-23 13:24:50 +0100 (Tue, 23 Mar 2010)");
  script_bugtraq_id(38887);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("freeSSHd SSH2 Connection Data Remote Buffer Overflow Vulnerability");
@@ -45,10 +47,8 @@
 
 References:
 http://www.securityfocus.com/bid/38887
-http://www.freesshd.com/
+http://www.freesshd.com/";
 
-Risk factor : High";
-
  script_description(desc);
  script_summary("Determine if freeSSHd is prone to a remote buffer-overflow");
  script_category(ACT_DENIAL);


Property changes on: trunk/openvas-plugins/scripts/gb_freeSSHd_38887.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fsecure_prdts_detect_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fsecure_prdts_detect_win.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_fsecure_prdts_detect_win.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_fsecure_prdts_detect_win.nasl 995 2009-03-12 15:14:29Z mar $
+# $Id$
 #
 # F-Secure Multiple Products Version Detection (Win)
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(800355);
-  script_version("$Revision: 1.1 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-13 14:39:10 +0100 (Fri, 13 Mar 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("F-Secure Multiple Products Version Detection (Win)");
   desc = "
   Overview: The script detects the installed version of F-Secure Anti-Virus
   (for MS Exchange), Workstations and Internet GateKeeper & sets the version
-  in KB.
+  in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Sets the Version of F-Secure Products");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fsecure_prdts_detect_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_feb11_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_feb11_lin.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_feb11_lin.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_google_chrome_mult_vuln_feb11_lin.nasl 13596 2011-02-08 16:30:17 feb $
+# $Id$
 #
 # Google Chrome multiple vulnerabilities - February 11(Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801740);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-08 15:34:31 +0100 (Tue, 08 Feb 2011)");
   script_cve_id("CVE-2011-0777", "CVE-2011-0778", "CVE-2011-0779",
                 "CVE-2011-0780", "CVE-2011-0781", "CVE-2011-0783",
                 "CVE-2011-0784");


Property changes on: trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln_feb11_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_home_ftp_server_dir_trav_vun.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_home_ftp_server_dir_trav_vun.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_home_ftp_server_dir_trav_vun.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_home_ftp_server_dir_trav_vun.nasl 14057 2011-03-01 16:10:56Z mar $
+# $Id$
 #
 # Home FTP Server Multiple Directory Traversal Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801599);
-  script_version("$Revision:1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-04 14:32:35 +0100 (Fri, 04 Mar 2011)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_name("Home FTP Server Multiple Directory Traversal Vulnerabilities");


Property changes on: trunk/openvas-plugins/scripts/gb_home_ftp_server_dir_trav_vun.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_horde_lfi_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_horde_lfi_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_horde_lfi_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_horde_lfi_vuln.nasl 33491 2011-02-16 14:14:14Z feb $
+# $Id$
 #
 # Horde Products Local File Inclusion Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801849);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-17 16:08:28 +0100 (Thu, 17 Feb 2011)");
   script_cve_id("CVE-2009-0932");
   script_bugtraq_id(33491);
   script_tag(name:"cvss_base", value:"6.4");


Property changes on: trunk/openvas-plugins/scripts/gb_horde_lfi_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_smh_insight_diag_mult_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_smh_insight_diag_mult_xss_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_hp_smh_insight_diag_mult_xss_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_hp_smh_insight_diag_mult_xss_vuln.nasl 12515 2010-12-14 14:57:35Z dec $
+# $Id$
 #
 # HP SMH Insight Diagnostics Multiple Cross Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800189);
-  script_version("Revision: 1.0 ");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-21 15:42:46 +0100 (Tue, 21 Dec 2010)");
   script_cve_id("CVE-2010-3003");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/gb_hp_smh_insight_diag_mult_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835027);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00178");
   script_name( "HP-UX Update for Filesystem Deadlock HPSBUX00178");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00967116-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00967116-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Filesystem Deadlock");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00178.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835160);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00179");
   script_name( "HP-UX Update for running sendmail(1M) HPSBUX00179");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994295-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994295-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of running sendmail(1M)");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00179.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835152);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00249");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00943079-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00943079-1";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of Tomcat");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00249.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02431.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02431.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02431.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835200);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-07-17 15:07:58 +0200 (Fri, 17 Jul 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "HPSBUX", value: "02431");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01756421-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01756421-1";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of Apache Web Server Suite");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02431.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_maildrop_priv_esc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_maildrop_priv_esc_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_maildrop_priv_esc_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_maildrop_priv_esc_vuln.nasl 7136 2010-02-08 12:33:29 feb $
+# $Id$
 #
 # Maildrop Privilege Escalation Vulnerability.
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800292);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-08 10:53:20 +0100 (Mon, 08 Feb 2010)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2010-0301");
@@ -59,8 +61,7 @@
 
   CVSS Score:
    CVSS Base Score       : 6.9 (AV:L/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score  : 5.1
-  Risk factor : High";
+    CVSS Temporal Score  : 5.1";
 
   script_description(desc);
   script_summary("Check for the version of Maildrop");


Property changes on: trunk/openvas-plugins/scripts/gb_maildrop_priv_esc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_006.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_006.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_006.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830248);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:53:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDKSA", value: "2007:006");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-01/msg00009.php
+  http://lists.mandriva.com/security-announce/2007-01/msg00009.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_006.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_018.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_018.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_018.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830664);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:018");
   script_name( "Mandriva Update for mysql MDVA-2008:018 (mysql)");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-01/msg00050.php
+  http://lists.mandriva.com/security-announce/2008-01/msg00050.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of mysql");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_018.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_096.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_096.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_096.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830723);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:096");
   script_name( "Mandriva Update for ntfs-3g MDVA-2008:096 (ntfs-3g)");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-06/msg00024.php
+  http://lists.mandriva.com/security-announce/2008-06/msg00024.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ntfs-3g");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_096.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_130.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_130.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_130.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830701);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:09:08 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:130");
   script_name( "Mandriva Update for drakxtools MDVA-2008:130 (drakxtools)");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-10/msg00003.php
+  http://lists.mandriva.com/security-announce/2008-10/msg00003.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of drakxtools");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_130.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_192.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_192.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_192.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830465);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:09:08 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:192");
   script_name( "Mandriva Update for mandriva-release MDVA-2008:192 (mandriva-release)");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-12/msg00012.php
+  http://lists.mandriva.com/security-announce/2008-12/msg00012.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of mandriva-release");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_192.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_163.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_163.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_163.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831070);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-11 13:46:51 +0200 (Fri, 11 Jun 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:163");
   script_name("Mandriva Update for php MDVA-2010:163 (php)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_163.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_229.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_229.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_229.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831265);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:229");
   script_name("Mandriva Update for bacula MDVA-2010:229 (bacula)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_229.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_100.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_100.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_100.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831042);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:100");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_100.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_117.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_117.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_117.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831081);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-18 17:26:33 +0200 (Fri, 18 Jun 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:117");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_117.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_257.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_257.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_257.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831290);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-04 09:11:34 +0100 (Tue, 04 Jan 2011)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:257");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_257.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_108.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_108.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_108.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831417);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-20 08:37:08 +0200 (Mon, 20 Jun 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2011:108");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_108.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mapserver_41855.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mapserver_41855.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_mapserver_41855.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100737);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-08-02 19:12:50 +0200 (Mon, 02 Aug 2010)");
  script_bugtraq_id(41855);
  script_cve_id("CVE-2010-2539","CVE-2010-2540");
  script_tag(name:"cvss_base", value:"10.0");
- script_version("1.0-$Revision$");
 
  script_name("MapServer Buffer Overflow and Unspecified Security Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_mapserver_41855.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl 13801 2011-02-17 14:21:24Z feb $
+# $Id$
 #
 # Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
 #
@@ -28,6 +28,8 @@
 {
   script_id(801596);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-23 12:24:37 +0100 (Wed, 23 Feb 2011)");
   script_cve_id("CVE-2011-0977");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_office_excel_drawing_layer_code_exec_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_windows_hid_over_usb_code_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_windows_hid_over_usb_code_exec_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ms_windows_hid_over_usb_code_exec_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_windows_hid_over_usb_code_exec_vuln.nasl 13392 2011-01-25 14:14:14Z jan $
+# $Id$
 #
 # MS Windows HID Functionality(Over USB) Code Execution Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801581);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-31 05:37:34 +0100 (Mon, 31 Jan 2011)");
   script_cve_id("CVE-2011-0638");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_windows_hid_over_usb_code_exec_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_openpro_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_openpro_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_openpro_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_openpro_detect.nasl 4317 2009-09-03 13:58:24Z aug $
+# $Id$
 #
 # OpenPro Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(800928);
-  script_version("Revision: 1.0 ");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-07 19:45:38 +0200 (Mon, 07 Sep 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("OpenPro Version Detection");
   desc = "
   Overview: This script detects the installed version of OpenPro and
-  sets the result in KB.
+  sets the result in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Set the KB for the version of OpenPro");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_openpro_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win02_jul11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win02_jul11.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win02_jul11.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_opera_mult_vuln_win02_jul11.nasl 15977 2011-07-04 18:34:11Z jul $
+# $Id$
 #
 # Opera Browser Multiple Vulnerabilities July-11 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802112);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-05 13:15:06 +0200 (Tue, 05 Jul 2011)");
   script_cve_id("CVE-2011-2635", "CVE-2011-2634", "CVE-2011-2636",
                 "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639",
                 "CVE-2011-2640");


Property changes on: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win02_jul11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_php_traverser_41899.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_traverser_41899.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_php_traverser_41899.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100734);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-08-02 14:28:14 +0200 (Mon, 02 Aug 2010)");
  script_bugtraq_id(41899);
  script_tag(name:"cvss_base", value:"7.5");
   script_cve_id("CVE-2009-4085");
- script_version ("1.0-$Revision$");
 
  script_name("PHP Traverser 'mp3_id.php' Remote File Include Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_php_traverser_41899.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_phpkick_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phpkick_sql_inj_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_phpkick_sql_inj_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_phpkick_sql_inj_vuln.nasl 10690 2010-08-18 12:33:29 aug $
+# $Id$
 #
 # PHPKick 'statistics.php' SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801431);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-19 10:23:11 +0200 (Thu, 19 Aug 2010)");
   script_cve_id("CVE-2010-3029");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_phpkick_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_phpldapadmin_50331.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phpldapadmin_50331.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_phpldapadmin_50331.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,9 +27,11 @@
 if (description)
 {
  script_id(103314);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-10-25 16:57:43 +0200 (Tue, 25 Oct 2011)");
  script_bugtraq_id(50331);
  script_cve_id("CVE-2011-4075");
- script_version ("$Revision$");
  script_name("phpLDAPadmin 'functions.php' Remote PHP Code Injection Vulnerability");
 
 desc = "Overview:


Property changes on: trunk/openvas-plugins/scripts/gb_phpldapadmin_50331.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_phpmv_clickheat_unspecified_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phpmv_clickheat_unspecified_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_phpmv_clickheat_unspecified_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_phpmv_clickheat_unspecified_vuln.nasl 8103 2010-04-02 10:35:29Z apr $
+# $Id$
 #
 # PhpMyVisites ClickHeat Plugin Unspecified Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801202);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-07 16:20:50 +0200 (Wed, 07 Apr 2010)");
   script_cve_id("CVE-2009-4763");
   script_bugtraq_id(38824);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/gb_phpmv_clickheat_unspecified_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_pyftpdlib_mult_vuln_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_pyftpdlib_mult_vuln_01.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_pyftpdlib_mult_vuln_01.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_pyftpdlib_mult_vuln_01.nasl 11737 2010-10-26 12:12:12Z oct $
+# $Id$
 #
 # pyftpdlib FTP Server Multiple Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801615);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-28 11:50:37 +0200 (Thu, 28 Oct 2010)");
   script_cve_id("CVE-2008-7263", "CVE-2008-7264");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_pyftpdlib_mult_vuln_01.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_qip_icq_message_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_qip_icq_message_dos_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_qip_icq_message_dos_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_qip_icq_message_dos_vuln.nasl 832 2009-03-17 11:28:24Z mar $
+# $Id$
 #
 # Qip ICQ Message Denial Of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800541);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-18 14:25:01 +0100 (Wed, 18 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-0769");
@@ -58,8 +60,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.4
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.4";
 
   script_description(desc);
   script_summary("Check for the version of QIP");


Property changes on: trunk/openvas-plugins/scripts/gb_qip_icq_message_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_quickphp_45626.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_quickphp_45626.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_quickphp_45626.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103002);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-01-03 14:40:34 +0100 (Mon, 03 Jan 2011)");
  script_bugtraq_id(45626);
- script_version ("1.0-$Revision$");
 
  script_name("QuickPHP 'index.php' Remote Source Code Disclosure Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_quickphp_45626.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_raja_natarajan_guestbook_46098.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_raja_natarajan_guestbook_46098.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_raja_natarajan_guestbook_46098.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103057);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-02-03 13:07:13 +0100 (Thu, 03 Feb 2011)");
  script_bugtraq_id(46098);
- script_version ("1.0-$Revision$");
 
  script_name("Raja Natarajan Guestbook 'lang' Parameter Local File Include Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_raja_natarajan_guestbook_46098.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_109326_24.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_109326_24.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_solaris_109326_24.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855168);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:37:58 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "109326-24");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-109326-24-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-109326-24-1";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of libresolv.so.2, in.named and BIND9");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_109326_24.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_117123_08.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_117123_08.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_solaris_117123_08.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855008);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "117123-08");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-117123-08-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-117123-08-1";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of wanboot");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_117123_08.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_120273_27.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_120273_27.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_solaris_120273_27.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855722);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-13 15:16:45 +0200 (Tue, 13 Oct 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "120273-27");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-120273-27-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-120273-27-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of SMA");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_120273_27.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_122212_32.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_122212_32.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_solaris_122212_32.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855301);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:31:50 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "122212-32");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122212-32-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122212-32-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of GNOME 2.6.0");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_122212_32.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_141500_05.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_141500_05.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_solaris_141500_05.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855823);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-03 13:24:57 +0100 (Wed, 03 Feb 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "141500-05");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-141500-05-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-141500-05-1";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of kinit");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_141500_05.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_suse_2007_017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_suse_2007_017.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_suse_2007_017.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(850107);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-28 13:40:10 +0100 (Wed, 28 Jan 2009)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUSE-SA", value: "2007-017");
@@ -58,10 +60,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www.novell.com/linux/security/advisories/2007_17_clamav.html
+  http://www.novell.com/linux/security/advisories/2007_17_clamav.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of clamav");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_suse_2007_017.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_suse_2007_065.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_suse_2007_065.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_suse_2007_065.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(850091);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-28 13:40:10 +0100 (Wed, 28 Jan 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUSE-SA", value: "2007-065");
@@ -61,10 +63,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www.novell.com/linux/security/advisories/2007_65_samba.html
+  http://www.novell.com/linux/security/advisories/2007_65_samba.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of samba");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_suse_2007_065.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_suse_2010_015.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_suse_2010_015.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_suse_2010_015.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(850128);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-05 12:48:43 +0100 (Fri, 05 Mar 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUSE-SA", value: "2010-015");
@@ -93,10 +95,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www.novell.com/linux/security/advisories/2010_15_mozilla.html
+  http://www.novell.com/linux/security/advisories/2010_15_mozilla.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of MozillaFirefox,seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_suse_2010_015.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_syncrify_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_syncrify_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_syncrify_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -37,7 +37,9 @@
  
  script_tag(name:"risk_factor", value:"None");
  script_id(100819);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-09-22 16:24:51 +0200 (Wed, 22 Sep 2010)");
 
  script_name("Syncrify Detection");
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/gb_syncrify_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_titan_ftp_server_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_titan_ftp_server_dos_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_titan_ftp_server_dos_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_titan_ftp_server_dos_vuln.nasl 994 2009-02-09 15:00:29Z feb $
+# $Id$
 #
 # TitanFTP Server Denial of Service Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800237);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-11 16:51:00 +0100 (Wed, 11 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2008-6082");
@@ -59,8 +61,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of TitanFTP Server");


Property changes on: trunk/openvas-plugins/scripts/gb_titan_ftp_server_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1018_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1018_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1018_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840540);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-11-23 15:30:07 +0100 (Tue, 23 Nov 2010)");
   script_tag(name:"cvss_base", value:"7.6");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1018-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1018_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1031_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1031_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1031_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840546);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1031-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1031_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1064_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1064_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1064_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840589);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-18 15:15:05 +0100 (Fri, 18 Feb 2011)");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "1064-1");
   script_tag(name:"cvss_base", value:"5.0");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1064_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1136_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1136_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1136_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840662);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-03 09:20:26 +0200 (Fri, 03 Jun 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "1136-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1136_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1169_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1169_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1169_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(840697);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-18 15:23:56 +0200 (Mon, 18 Jul 2011)");
   script_tag(name:"cvss_base", value:"4.3");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "1169-1");
   script_cve_id("CVE-2011-1829");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1169_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1238_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1238_2.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1238_2.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840784);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-31 13:45:00 +0100 (Mon, 31 Oct 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1238-2");
   script_name("Ubuntu Update for puppet USN-1238-2");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1238_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_398_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_398_2.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_398_2.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840162);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "398-2");
@@ -56,10 +58,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-January/000457.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-January/000457.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of firefox vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_398_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_417_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_417_2.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_417_2.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840182);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "417-2");
   script_name( "Ubuntu Update for postgresql-8.1 regression USN-417-2");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-February/000481.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-February/000481.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of postgresql-8.1 regression");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_417_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_550_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_550_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_550_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840018);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "550-1");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-December/000632.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-December/000632.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of libcairo vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_550_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_635_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_635_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_635_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840193);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "635-1");
@@ -93,10 +95,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-August/000741.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-August/000741.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of xine-lib vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_635_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_887_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_887_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_887_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840371);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-20 09:25:19 +0100 (Wed, 20 Jan 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "887-1");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001030.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001030.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of libthai vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_887_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_2.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_2.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840376);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-01-22 10:23:05 +0100 (Fri, 22 Jan 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "890-2");
@@ -60,10 +62,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001034.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2010-January/001034.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of python2.5 vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_890_2.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_927_3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_927_3.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_927_3.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840417);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-16 17:02:11 +0200 (Fri, 16 Apr 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "927-3");
   script_name("Ubuntu Update for thunderbird regression USN-927-3");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_927_3.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_998_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_998_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_998_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(840516);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-22 16:42:09 +0200 (Fri, 22 Oct 2010)");
   script_tag(name:"cvss_base", value:"9.3");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "998-1");
   script_cve_id("CVE-2010-3175", "CVE-2010-3176", "CVE-2010-3178", "CVE-2010-3179", "CVE-2010-3180", "CVE-2010-3182", "CVE-2010-3183");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_998_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vmware_prdts_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vmware_prdts_dos_vuln_win.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_vmware_prdts_dos_vuln_win.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vmware_prdts_dos_vuln_win.nasl 873 2009-02-03 15:35:21Z feb $
+# $Id$
 #
 # VMware Products vmware-authd Denial of Service Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800410);
-  script_version("$Revision: 1.1 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-06 13:48:17 +0100 (Fri, 06 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-0177");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 4.5
-  Risk factor : Medium";
+    CVSS Temporal Score : 4.5";
 
   script_description(desc);
   script_summary("Check for the version of VMware Products");


Property changes on: trunk/openvas-plugins/scripts/gb_vmware_prdts_dos_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_wondercms_44916.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wondercms_44916.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_wondercms_44916.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100908);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-11-18 13:10:44 +0100 (Thu, 18 Nov 2010)");
  script_bugtraq_id(44916);
- script_version ("1.0-$Revision$");
 
  script_name("WonderCMS 'page' Parameter Cross Site Scripting And Information Disclosure Vulnerabilities");
 


Property changes on: trunk/openvas-plugins/scripts/gb_wondercms_44916.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_xdataface_dataface_lfi_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_xdataface_dataface_lfi_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_xdataface_dataface_lfi_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_xdataface_dataface_lfi_vuln.nasl 15566 2011-06-09 14:14:14Z jun $
+# $Id$
 #
 # Xataface Dataface '-action' Local File Inclusion Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801950);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-13 15:28:04 +0200 (Mon, 13 Jun 2011)");
   script_bugtraq_id(48126);
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_xdataface_dataface_lfi_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl 6032 2009-12-05 13:33:29Z dec $
+# $Id$
 #
 # Yahoo! Messenger 'YahooBridgeLib.dll' ActiveX Control DOS Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801150);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-08 05:49:24 +0100 (Tue, 08 Dec 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-4171");
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of Yahoo! Messenger");


Property changes on: trunk/openvas-plugins/scripts/gb_yahoo_msg_actvx_ctrl_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_yaws_44564.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_yaws_44564.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_yaws_44564.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100887);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-11-02 13:46:58 +0100 (Tue, 02 Nov 2010)");
  script_tag(name:"cvss_base", value:"5.0");
   script_cve_id("CVE-2010-4181");
  script_bugtraq_id(44564);
- script_version ("1.0-$Revision$");
 
  script_name("Yaws URI Directory Traversal Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_yaws_44564.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_zywall_usg_47707.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_zywall_usg_47707.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gb_zywall_usg_47707.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103161);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 13:24:44 +0200 (Thu, 12 May 2011)");
  script_bugtraq_id(47707);
- script_version ("1.0-$Revision$");
 
  script_name("Multiple ZyWALL USG Products Remote Security Bypass Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_zywall_usg_47707.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200312_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200312_02.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200312_02.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(54508);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(9138);
  script_cve_id("CVE-2003-0961");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200312-02 (Kernel)";
@@ -54,10 +56,8 @@
     # [reboot]
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200312-02
-http://bugs.gentoo.org/show_bug.cgi?id=34844
+http://bugs.gentoo.org/show_bug.cgi?id=34844";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200312-02 (Kernel)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200312_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200406_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200406_17.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200406_17.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54602);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200406-17 (IPsec-Tools)";
  script_name(name);
@@ -47,10 +49,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200406-17
 http://bugs.gentoo.org/show_bug.cgi?id=53915
-http://ipsec-tools.sourceforge.net/x509sig.html
+http://ipsec-tools.sourceforge.net/x509sig.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200406-17 (IPsec-Tools)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200406_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200408_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200408_17.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200408_17.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54647);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200408-17 (rsync)";
  script_name(name);
@@ -50,10 +52,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200408-17
 http://bugs.gentoo.org/show_bug.cgi?id=60309
 http://samba.org/rsync/#security_aug04
-http://lists.samba.org/archive/rsync-announce/2004/000017.html
+http://lists.samba.org/archive/rsync-announce/2004/000017.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200408-17 (rsync)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200408_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200409_05.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200409_05.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200409_05.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54662);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200409-05 (Gallery)";
  script_name(name);
@@ -49,10 +51,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200409-05
 http://bugs.gentoo.org/show_bug.cgi?id=60742
 http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html
-http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0
+http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200409-05 (Gallery)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200409_05.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200411_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200411_07.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200411_07.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(54728);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(11592);
  script_cve_id("CVE-2004-0992");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200411-07 (Proxytunnel)";
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200411-07
 http://bugs.gentoo.org/show_bug.cgi?id=69379
-http://proxytunnel.sourceforge.net/news.html
+http://proxytunnel.sourceforge.net/news.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200411-07 (Proxytunnel)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200411_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200411_25.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200411_25.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200411_25.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54746);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Low");
  name = "Gentoo Security Advisory GLSA 200411-25 (SquirrelMail)";
  script_name(name);
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200411-25
 http://bugs.gentoo.org/show_bug.cgi?id=70739
-http://article.gmane.org/gmane.mail.squirrelmail.user/21169
+http://article.gmane.org/gmane.mail.squirrelmail.user/21169";
 
-Risk factor : Low";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200411-25 (SquirrelMail)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200411_25.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200412_13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200412_13.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200412_13.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(54772);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(11973);
  script_cve_id("CVE-2004-1154");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200412-13 (Samba)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=net-fs/samba-3.0.9-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200412-13
-http://bugs.gentoo.org/show_bug.cgi?id=73943
+http://bugs.gentoo.org/show_bug.cgi?id=73943";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200412-13 (Samba)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200412_13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200503_16.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200503_16.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200503_16.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54881);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-0699", "CVE-2005-0704", "CVE-2005-0705", "CVE-2005-0739");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200503-16 (ethereal)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200503-16
 http://bugs.gentoo.org/show_bug.cgi?id=84547
-http://www.ethereal.com/appnotes/enpa-sa-00018.html
+http://www.ethereal.com/appnotes/enpa-sa-00018.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200503-16 (ethereal)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200503_16.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200511_14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200511_14.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200511_14.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(55891);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-2975", "CVE-2005-2976", "CVE-2005-3186");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200511-14 (gtk+)";
@@ -54,10 +56,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200511-14
 http://bugs.gentoo.org/show_bug.cgi?id=112608
-http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities
+http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200511-14 (gtk+)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200511_14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200608_04.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200608_04.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200608_04.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57854);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-3113", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200608-04 (Thunderbird)";
@@ -54,10 +56,8 @@
 '>=mail-client/mozilla-thunderbird-bin-1.5.0.5'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-04
-http://bugs.gentoo.org/show_bug.cgi?id=141842
+http://bugs.gentoo.org/show_bug.cgi?id=141842";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200608-04 (Thunderbird)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200608_04.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200608_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200608_07.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200608_07.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57857);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-3459", "CVE-2006-3460", "CVE-2006-3461", "CVE-2006-3462", "CVE-2006-3463", "CVE-2006-3464", "CVE-2006-3465");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200608-07 (tiff)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-libs/tiff-3.8.2-r2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-07
-http://bugs.gentoo.org/show_bug.cgi?id=142383
+http://bugs.gentoo.org/show_bug.cgi?id=142383";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200608-07 (tiff)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200608_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200612_14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200612_14.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200612_14.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57953);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-5878");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200612-14 (trac)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=www-apps/trac-0.10.1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200612-14
-http://bugs.gentoo.org/show_bug.cgi?id=154574
+http://bugs.gentoo.org/show_bug.cgi?id=154574";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200612-14 (trac)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200612_14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200701_14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200701_14.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200701_14.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57974);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-5989");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200701-14 (mod_auth_kerb)";
@@ -48,10 +50,8 @@
 '>=net-www/mod_auth_kerb-5.0_rc7-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200701-14
-http://bugs.gentoo.org/show_bug.cgi?id=155782
+http://bugs.gentoo.org/show_bug.cgi?id=155782";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200701-14 (mod_auth_kerb)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200701_14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200701_24.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200701_24.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200701_24.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57984);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-0017");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200701-24 (vlc)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=media-video/vlc-0.8.6-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200701-24
-http://bugs.gentoo.org/show_bug.cgi?id=159845
+http://bugs.gentoo.org/show_bug.cgi?id=159845";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200701-24 (vlc)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200701_24.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200703_15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200703_15.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200703_15.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58153);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-0555", "CVE-2007-0556");
- script_version ("$");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200703-15 (postgresql)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose 'dev-db/postgresql'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200703-15
-http://bugs.gentoo.org/show_bug.cgi?id=165482
+http://bugs.gentoo.org/show_bug.cgi?id=165482";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200703-15 (postgresql)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200703_15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200707_10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200707_10.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200707_10.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(58531);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200707-10 (festival)";
  script_name(name);
@@ -45,10 +47,8 @@
 # emerge --ask --oneshot --verbose '>=app-accessibility/festival-1.95_beta-r4'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200707-10
-http://bugs.gentoo.org/show_bug.cgi?id=170477
+http://bugs.gentoo.org/show_bug.cgi?id=170477";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200707-10 (festival)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200707_10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200709_18.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200709_18.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200709_18.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58648);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-4538", "CVE-2007-4539", "CVE-2007-4543");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200709-18 (bugzilla)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose www-apps/bugzilla
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200709-18
-http://bugs.gentoo.org/show_bug.cgi?id=190112
+http://bugs.gentoo.org/show_bug.cgi?id=190112";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200709-18 (bugzilla)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200709_18.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200803_19.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200803_19.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200803_19.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60582);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-6203", "CVE-2007-6422", "CVE-2008-0005", "CVE-2008-0455", "CVE-2008-0456");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200803-19 (apache)";
@@ -49,10 +51,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=201163
 http://bugs.gentoo.org/show_bug.cgi?id=204410
 http://bugs.gentoo.org/show_bug.cgi?id=205195
-http://bugs.gentoo.org/show_bug.cgi?id=209899
+http://bugs.gentoo.org/show_bug.cgi?id=209899";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200803-19 (apache)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200803_19.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200904_09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200904_09.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200904_09.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(63803);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_cve_id("CVE-2009-0844", "CVE-2009-0845", "CVE-2009-0846", "CVE-2009-0847");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200904-09 (mit-krb5)";
@@ -51,10 +53,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200904-09
 http://bugs.gentoo.org/show_bug.cgi?id=262736
-http://bugs.gentoo.org/show_bug.cgi?id=263398
+http://bugs.gentoo.org/show_bug.cgi?id=263398";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200904-09 (mit-krb5)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200904_09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200909_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200909_06.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_200909_06.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(64875);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-15 22:46:32 +0200 (Tue, 15 Sep 2009)");
  script_cve_id("CVE-2009-1440");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("Gentoo Security Advisory GLSA 200909-06 (amule)");
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose =net-p2p/amule-2.2.5
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200909-06
-http://bugs.gentoo.org/show_bug.cgi?id=268163
+http://bugs.gentoo.org/show_bug.cgi?id=268163";
 
-Risk factor: High";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 200909-06 (amule)");


Property changes on: trunk/openvas-plugins/scripts/glsa_200909_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201006_13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201006_13.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/glsa_201006_13.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,10 +30,12 @@
 if(description)
 {
  script_id(69016);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"10.0");
  script_cve_id("CVE-2008-1066", "CVE-2008-4810", "CVE-2008-4811", "CVE-2009-1669");
  script_tag(name:"risk_factor", value:"Critical");
- script_version ("$Revision$");
  script_name("Gentoo Security Advisory GLSA 201006-13 (smarty)");
 
  desc = "The remote host is missing updates announced in
@@ -51,10 +53,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201006-13
 http://bugs.gentoo.org/show_bug.cgi?id=212147
 http://bugs.gentoo.org/show_bug.cgi?id=243856
-http://bugs.gentoo.org/show_bug.cgi?id=270494
+http://bugs.gentoo.org/show_bug.cgi?id=270494";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201006-13 (smarty)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201006_13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gravity_board_x_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gravity_board_x_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/gravity_board_x_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -32,14 +32,14 @@
   in PHP and MySQL. 
 
  See also:
-  http://www.gravityboardx.com/
+  http://www.gravityboardx.com/";
 
- Risk factor : None";
-
 if (description)
 {
  script_id(100100);
- script_version ("1.0");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-05 13:52:05 +0200 (Sun, 05 Apr 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("Gravity Board X Detection");  


Property changes on: trunk/openvas-plugins/scripts/gravity_board_x_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ilohamail_password_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ilohamail_password_disclosure.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ilohamail_password_disclosure.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -25,6 +25,8 @@
 if (description) {
   script_id(14636);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"Low");
 
   script_xref(name:"OSVDB", value:"7401");
@@ -41,9 +43,7 @@
 ***** simply by looking at the version number of IlohaMail 
 ***** installed there.
 
-Solution : Upgrade to IlohaMail version 0.7.0 or later.
-
-Risk factor : Low";
+Solution : Upgrade to IlohaMail version 0.7.0 or later.";
   script_description(desc);
  
   summary = "Checks for Password Disclosure vulnerability in IlohaMail";

Modified: trunk/openvas-plugins/scripts/macosx_upd_10_5_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/macosx_upd_10_5_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/macosx_upd_10_5_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,6 +27,8 @@
 {
  script_id(102030);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-05-12 14:48:44 +0200 (Wed, 12 May 2010)");
  script_cve_id("CVE-2007-4702","CVE-2007-4703","CVE-2007-4704");
  script_name("Mac OS X 10.5.1 Update");
  desc = "


Property changes on: trunk/openvas-plugins/scripts/macosx_upd_10_5_1.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_022.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_022.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mdksa_2009_022.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63253);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)");
  script_cve_id("CVE-2007-4782", "CVE-2007-4850", "CVE-2008-1384", "CVE-2008-2050", "CVE-2008-3658", "CVE-2008-3659", "CVE-2008-3660", "CVE-2008-5498");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Mandrake Security Advisory MDVSA-2009:022 (php)";
@@ -80,10 +82,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:022
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:022";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:022 (php)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_022.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_046.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_046.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mdksa_2009_046.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63423);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-23 21:31:14 +0100 (Mon, 23 Feb 2009)");
  script_cve_id("CVE-2008-5984");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  name = "Mandrake Security Advisory MDVSA-2009:046 (dia)";
@@ -52,10 +54,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:046
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:046";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:046 (dia)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_046.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_160.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_160.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mdksa_2009_160.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64462);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)");
  script_cve_id("CVE-2009-1904");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:160 (ruby)");
@@ -51,10 +53,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:160
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:160";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:160 (ruby)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_160.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_176.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_176.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mdksa_2009_176.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64519);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2108");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:176 (git)");
@@ -51,10 +53,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:176
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:176";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:176 (git)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_176.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_256.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_256.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mdksa_2009_256.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65733);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2008-3834", "CVE-2009-1189");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"3.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:256 (dbus)");
@@ -53,10 +55,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:256
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:256";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:256 (dbus)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_256.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_290.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_290.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mdksa_2009_290.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66125);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_cve_id("CVE-2009-0689", "CVE-2009-3380", "CVE-2009-3274", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3373", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-3374", "CVE-2009-3376");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandriva Security Advisory MDVSA-2009:290 (firefox)");
@@ -53,10 +55,8 @@
 of md5 checksums and GPG signatures is performed automatically for you.
 
 https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:290
-http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.15
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.15";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Mandriva Security Advisory MDVSA-2009:290 (firefox)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_290.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mozilla_certif_handle_dos.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mozilla_certif_handle_dos.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mozilla_certif_handle_dos.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,9 +29,11 @@
 if(description)
 {
   script_id(14668);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_bugtraq_id(10703);
   script_cve_id("CVE-2004-0758");
-  script_version("$Revision$");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_name("Mozilla/Firefox security manager certificate handling DoS");
@@ -43,10 +45,8 @@
   the PSM certificate store.
   This corruption may result in a deny of SSL connections.
 
-  Solution : Upgrade to the latest version of this software
+  Solution : Upgrade to the latest version of this software";
 
-  Risk factor : Medium";
-
   script_description(desc);
   script_summary("Determines the version of Mozilla/Firefox");
   script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/mozilloCMS_34474.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mozilloCMS_34474.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/mozilloCMS_34474.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,10 +28,12 @@
 if (description)
 {
  script_id(100124);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-12 20:09:50 +0200 (Sun, 12 Apr 2009)");
  script_tag(name:"cvss_base", value:"4.3");
  script_cve_id("CVE-2009-1367");
  script_bugtraq_id(34474);
- script_version ("1.0");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("MoziloCMS Local File Include and Cross Site Scripting Vulnerabilities");
@@ -54,10 +56,8 @@
   MoziloCMS 1.11 is vulnerable; other versions may also be affected. 
 
  See also:
-  http://www.securityfocus.com/bid/34474
+  http://www.securityfocus.com/bid/34474";
 
- Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if MoziloCMS is vulnerable to Multiple Vulnerabilities");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/mozilloCMS_34474.nasl
___________________________________________________________________
Name: svn:keywords
   - ID
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/netasq.nasl
===================================================================
--- trunk/openvas-plugins/scripts/netasq.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/netasq.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -25,7 +25,9 @@
 if(description)
 {
  script_id(14378);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"Low");
  name = "NetAsq identification";
  
@@ -46,8 +48,7 @@
 Solution : do not allow any connection on the
 firewall itself, except from trusted network.
 
-See also : http://www.netasq.com
-Risk factor : Low";
+See also : http://www.netasq.com";
 
 
 

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0308.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0308.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0308.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(63431);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-23 21:31:14 +0100 (Mon, 23 Feb 2009)");
  script_cve_id("CVE-2009-0577", "CVE-2008-3640");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "CentOS Security Advisory CESA-2009:0308 (cups)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0308
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0308
-https://rhn.redhat.com/errata/RHSA-2009-0308.html
+https://rhn.redhat.com/errata/RHSA-2009-0308.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:0308 (cups)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_0308.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(64268);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-23 15:49:15 +0200 (Tue, 23 Jun 2009)");
  script_cve_id("CVE-2004-2541", "CVE-2006-4262", "CVE-2009-0148", "CVE-2009-1577");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "CentOS Security Advisory CESA-2009:1101 (cscope)";
@@ -44,10 +46,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1101
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1101
-https://rhn.redhat.com/errata/RHSA-2009-1101.html
+https://rhn.redhat.com/errata/RHSA-2009-1101.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "CentOS Security Advisory CESA-2009:1101 (cscope)";


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1101.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1206.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1206.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1206.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(64662);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2414", "CVE-2009-2416");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("CentOS Security Advisory CESA-2009:1206 (libxml2)");
@@ -43,10 +45,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1206
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1206
-https://rhn.redhat.com/errata/RHSA-2009-1206.html
+https://rhn.redhat.com/errata/RHSA-2009-1206.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("CentOS Security Advisory CESA-2009:1206 (libxml2)");


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1206.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1364.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1364.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1364.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(64939);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-21 23:13:00 +0200 (Mon, 21 Sep 2009)");
  script_cve_id("CVE-2009-2697");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1364 (gdm)");
@@ -42,10 +44,8 @@
 Update the appropriate packages on your system.
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1364
-http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1364
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1364";
 
-Risk factor: High";
-
  script_description(desc);
 
  script_summary("CentOS Security Advisory CESA-2009:1364 (gdm)");


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1364.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1465.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1465.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1465.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(66169);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_cve_id("CVE-2009-3290");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("CentOS Security Advisory CESA-2009:1465 (kvm)");
@@ -43,10 +45,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1465
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1465
-https://rhn.redhat.com/errata/RHSA-2009-1465.html
+https://rhn.redhat.com/errata/RHSA-2009-1465.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("CentOS Security Advisory CESA-2009:1465 (kvm)");


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1465.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(66621);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)");
  script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("CentOS Security Advisory CESA-2009:1674 (firefox)");
@@ -43,10 +45,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1674
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1674
-https://rhn.redhat.com/errata/RHSA-2009-1674.html
+https://rhn.redhat.com/errata/RHSA-2009-1674.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("CentOS Security Advisory CESA-2009:1674 (firefox)");


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/phpgroupware_xss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpgroupware_xss.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/phpgroupware_xss.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,9 +26,11 @@
 if(description)
 {
  script_id(14708);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(11130);
  script_cve_id("CVE-2004-0875");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "PhpGroupWare XSS";
@@ -44,8 +46,7 @@
 attacks.
 
 Solution : Update to version 0.9.16.003 or newer
-See also : http://www.phpgroupware.org/
-Risk factor: High";
+See also : http://www.phpgroupware.org/";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/proftpd_36804.nasl
===================================================================
--- trunk/openvas-plugins/scripts/proftpd_36804.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/proftpd_36804.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,9 +30,11 @@
 if (description)
 {
  script_id(100316);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-26 10:02:32 +0100 (Mon, 26 Oct 2009)");
  script_bugtraq_id(36804);
  script_cve_id("CVE-2009-3639");
- script_version ("1.0-$Revision$");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"risk_factor", value:"High");
 
@@ -56,10 +58,8 @@
 References:
 http://www.securityfocus.com/bid/36804
 http://bugs.proftpd.org/show_bug.cgi?id=3275
-http://www.proftpd.org
+http://www.proftpd.org";
 
-Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if ProFTPD version is < 1.3.2b");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/proftpd_36804.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_xss_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_xss_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_adobe_coldfusion_multiple_xss_vuln.nasl 17487 2011-09-30 12:12:12Z sep $
+# $Id$
 #
 # Adobe ColdFusion Multiple Cross Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902576);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-30 15:58:03 +0200 (Fri, 30 Sep 2011)");
   script_bugtraq_id(49787);
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_campsite_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_campsite_sql_inj_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_campsite_sql_inj_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_campsite_sql_inj_vuln.nasl 8917 2010-06-16 11:20:29Z jun $
+# $Id$
 #
 # Campsite 'article_id' Parameter SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902072);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-21 15:32:44 +0200 (Mon, 21 Jun 2010)");
   script_cve_id("CVE-2010-1867");
   script_bugtraq_id(39862);
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/secpod_campsite_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl 17116 2011-09-21 11:00:01Z sep $
+# $Id$
 #
 # ea-gBook 'inc_ordner' Parameter Local File Inclusion Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901207);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
   script_cve_id("CVE-2009-5095");
   script_bugtraq_id(33774);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_ea_gbook_inc_ordner_parameter_lfi_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_filezilla_server_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_filezilla_server_bof_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_filezilla_server_bof_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_filezilla_server_bof_vuln.nasl 927 2009-03-20 12:50:29Z mar $
+# $Id$
 #
 # FileZilla Server Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900519);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 08:26:42 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-0884");
@@ -58,8 +60,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.7
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.7";
 
   script_description(desc);
   script_summary("Check for the version of FileZilla Server");


Property changes on: trunk/openvas-plugins/scripts/secpod_filezilla_server_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_feb10_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_feb10_lin.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_feb10_lin.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_firefox_mult_vuln_feb10_win.nasl 7334 2010-02-22 14:33:29 feb $
+# $Id$
 #
 # Firefox Multiple Vulnerabilities Feb-10 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900743);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-22 13:34:53 +0100 (Mon, 22 Feb 2010)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2010-0648", "CVE-2010-0654");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score      : 4.3 (AV:N/AC:M/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score  : 3.7
-  Risk factor: Medium";
+    CVSS Temporal Score  : 3.7";
 
   script_description(desc);
   script_summary("Check for the version of Firefox");


Property changes on: trunk/openvas-plugins/scripts/secpod_firefox_mult_vuln_feb10_lin.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_hummingbird_activex_bof_vuln_900159.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_hummingbird_activex_bof_vuln_900159.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_hummingbird_activex_bof_vuln_900159.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,10 +26,12 @@
 if(description)
 {
   script_id(900159);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-21 15:08:20 +0200 (Tue, 21 Oct 2008)");
   script_cve_id("CVE-2008-4729");
  script_bugtraq_id(31783);
   script_copyright("Copyright (C) 2008 SecPod");
-  script_version("Revision: 1.0 ");
   script_tag(name:"cvss_base", value:"8.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_category(ACT_GATHER_INFO);
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C) 
-    CVSS Temporal Score : 6.5
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.5";
 
   script_description(desc);
   script_dependencies("secpod_reg_enum.nasl");


Property changes on: trunk/openvas-plugins/scripts/secpod_hummingbird_activex_bof_vuln_900159.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_mediawiki_mult_vuln_dec08.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mediawiki_mult_vuln_dec08.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_mediawiki_mult_vuln_dec08.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_mediawiki_mult_vuln_dec08.nasl 737 2008-12-23 17:15:29Z dec $
+# $Id$
 #
 # MediaWiki Multiple Vulnerabilities Dec08
 #
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(900421);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-29 13:55:43 +0100 (Mon, 29 Dec 2008)");
   script_tag(name:"cvss_base", value:"5.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-5249", "CVE-2008-5250", "CVE-2008-5252");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     :  5.8 (AV:N/AC:M/Au:NR/C:N/I:P/A:P)
-    CVSS Temporal Score :  4.3
-  Risk factor: High";
+    CVSS Temporal Score :  4.3";
 
   script_description(desc);
   script_summary("Check for the version of MediaWiki");


Property changes on: trunk/openvas-plugins/scripts/secpod_mediawiki_mult_vuln_dec08.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms08-061_900051.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-061_900051.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms08-061_900051.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,10 +27,12 @@
 if(description)
 {
   script_id(900051);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-15 19:56:48 +0200 (Wed, 15 Oct 2008)");
   script_bugtraq_id(31651, 31652, 31653);
   script_cve_id("CVE-2008-2250", "CVE-2008-2251", "CVE-2008-2252");
   script_copyright("Copyright (C) 2008 SecPod");
-  script_version("Revision: 1.1 ");
   script_tag(name:"cvss_base", value:"4.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_category(ACT_GATHER_INFO);
@@ -72,8 +74,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.6 (AV:L/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 3.4
-  Risk factor : Medium";
+    CVSS Temporal Score : 3.4";
 
   script_description(desc);
   script_dependencies("secpod_reg_enum.nasl");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms08-061_900051.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms08-077.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms08-077.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms08-077.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms08-077.nasl 657 2008-12-11 14:53:39Z dec $
+# $Id$
 #
 # Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900064);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-12 16:11:26 +0100 (Fri, 12 Dec 2008)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-4032");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.4 (AV:N/AC:L/Au:NR/C:P/I:P/A:N)
-    CVSS Temporal Score : 4.7
-  Risk factor: High";
+    CVSS Temporal Score : 4.7";
 
   script_description(desc);
   script_summary("Check for the vulnerable File Version");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms08-077.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms09-053.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-053.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms09-053.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms09-053.nasl 5261 2009-10-14 00:52:09Z oct $
+# $Id$
 #
 # Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
 #
@@ -31,6 +31,8 @@
 {
   script_id(900874);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-15 15:35:39 +0200 (Thu, 15 Oct 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-2521", "CVE-2009-3023");
@@ -69,8 +71,7 @@
 
   CVSS Score Report:
     CVSS Base Score     : 9.0 (AV:N/AC:L/Au:SI/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.1
-  Risk factor : Critical";
+    CVSS Temporal Score : 7.1";
 
   script_description(desc);
   script_summary("Check for the version of ftpsvc2.dll file");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms09-053.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms10-066.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-066.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms10-066.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms10-066.nasl 11094 2010-09-15 09:54:35Z sep $
+# $Id$
 #
 # Vulnerability in Remote Procedure Call Could Allow Remote Code Execution (982802)
 #
@@ -27,6 +27,8 @@
 {
   script_id(902300);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-15 17:01:07 +0200 (Wed, 15 Sep 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-2567");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms10-066.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms10-068.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-068.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms10-068.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms10-068.nasl 11096 2010-09-15 00:52:09Z sep $
+# $Id$
 #
 # MS Local Security Authority Subsystem Service Privilege Elevation Vulnerability (983539)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902244);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-15 17:01:07 +0200 (Wed, 15 Sep 2010)");
   script_tag(name:"cvss_base", value:"9.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0820");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms10-068.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms10-096.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-096.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms10-096.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms10-096.nasl 12602 2010-12-15 13:13:13Z dec $
+# $Id$
 #
 # Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901169);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-15 14:53:45 +0100 (Wed, 15 Dec 2010)");
   script_bugtraq_id(42648);
   script_cve_id("CVE-2010-3147");
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms10-096.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms11-014.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-014.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms11-014.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms11-014.nasl 13625 2011-02-11 13:14:35Z feb $
+# $Id$
 #
 # Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902289);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-09 17:14:46 +0100 (Wed, 09 Feb 2011)");
   script_cve_id("CVE-2011-0039");
   script_bugtraq_id(46152);
   script_tag(name:"cvss_base", value:"7.2");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-014.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms11-039.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-039.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_ms11-039.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms11-039.nasl 15631 2011-06-15 10:10:10Z jun $
+# $Id$
 #
 # Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902523);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-15 15:55:00 +0200 (Wed, 15 Jun 2011)");
   script_cve_id("CVE-2011-0664");
   script_bugtraq_id(48212);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-039.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_opera_info_disc_unspecified_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_opera_info_disc_unspecified_vuln_win.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_opera_info_disc_unspecified_vuln_win.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_opera_info_disc_unspecified_vuln_win.nasl 5900 2009-11-30 15:21:47Z nov $
+# $Id$
 #
 # Opera Information Disclosure and Unspecified Vulnerabilities - (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900986);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-11-30 15:32:46 +0100 (Mon, 30 Nov 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-4071", "CVE-2009-4072");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.4";
 
   script_description(desc);
   script_summary("Check for the version of Opera Web Browser");


Property changes on: trunk/openvas-plugins/scripts/secpod_opera_info_disc_unspecified_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_oracle_java_mult_unspecified_vuln_win_vuln.nasl 13927 2011-02-25 18:12:20Z feb $
+# $Id$
 #
 # Oracle Java SE Multiple Unspecified Vulnerabilities (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902347);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-28 11:12:07 +0100 (Mon, 28 Feb 2011)");
   script_cve_id("CVE-2010-4422", "CVE-2010-4451", "CVE-2010-4452", "CVE-2010-4470",
                 "CVE-2010-4472", "CVE-2010-4474");
   script_bugtraq_id(46402, 46405, 46388, 46387, 46404, 46407);


Property changes on: trunk/openvas-plugins/scripts/secpod_oracle_java_mult_unspecified_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_pango_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_pango_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_pango_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_pango_detect.nasl 2243 2009-05-20 15:21:24Z may $
+# $Id$
 #
 # Pango Version Detection
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(900643);
-  script_version("Revision: 1.0 ");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-22 08:49:17 +0200 (Fri, 22 May 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Pango Version Detection");
   desc = "
 
   Overview: This script detects the installed version of Pango and sets the
-  result in KB.
+  result in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of Pango");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_pango_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_pplive_code_exe_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_pplive_code_exe_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_pplive_code_exe_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_pplive_code_exe_vuln.nasl 1207 2009-03-31 13:50:24Z mar $
+# $Id$
 #
 # PPLive Multiple Argument Injection Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900536);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-02 08:15:32 +0200 (Thu, 02 Apr 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-1087");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 8.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.4";
 
   script_description(desc);
   script_summary("Check for the Version of PPLive");


Property changes on: trunk/openvas-plugins/scripts/secpod_pplive_code_exe_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_realplayer_mult_vuln_macosx.nasl 16833 2011-08-26 13:41:11Z aug $
+# $Id$
 #
 # RealNetworks RealPlayer Multiple Vulnerabilities (Mac OS X)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902623);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-31 10:37:30 +0200 (Wed, 31 Aug 2011)");
   script_cve_id("CVE-2011-2948", "CVE-2011-2951");
   script_bugtraq_id(49175, 49173);
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_twiki_multiple_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_twiki_multiple_xss_vuln.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_twiki_multiple_xss_vuln.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_twiki_xss_vuln.nasl 15345 2011-05-23 15:32:17Z may $
+# $Id$
 #
 # TWiki 'TemplateLogin.pm' Multiple XSS Vulnerabilities
 #
@@ -28,6 +28,8 @@
 {
   script_id(902434);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-26 10:47:46 +0200 (Thu, 26 May 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2011-1838");


Property changes on: trunk/openvas-plugins/scripts/secpod_twiki_multiple_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_vmware_server_mult_xss_vuln_dec09_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vmware_server_mult_xss_vuln_dec09_win.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_vmware_server_mult_xss_vuln_dec09_win.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_vmware_server_mult_xss_vuln_dec09_win.nasl 6251 2009-12-18 18:03:40Z dec $
+# $Id$
 #
 # VMware Server Multiple Cross-Site Scripting Vulnerabilities (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900896);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-21 07:14:17 +0100 (Mon, 21 Dec 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-3731");
@@ -70,8 +72,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:P/A:N)
-    CVSS Temporal Score : 3.4
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.4";
 
   script_description(desc);
   script_summary("Check for the version of VMware Server");


Property changes on: trunk/openvas-plugins/scripts/secpod_vmware_server_mult_xss_vuln_dec09_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_xnview_mbm_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_xnview_mbm_bof_vuln_win.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/secpod_xnview_mbm_bof_vuln_win.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerabilities Test
-# $Id: secpod_xnview_mbm_bof_vuln_win.nasl 9700 2010-06-18 17:11:45Z jun $
+# $Id$
 #
 # XnView 'MBM' Processing Buffer Overflow Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902075);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-22 13:34:32 +0200 (Tue, 22 Jun 2010)");
   script_cve_id("CVE-2010-1932");
   script_bugtraq_id("40852");
   script_tag(name:"cvss_base", value:"9.3");


Property changes on: trunk/openvas-plugins/scripts/secpod_xnview_mbm_bof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sendmail_forword_include.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sendmail_forword_include.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sendmail_forword_include.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(11349);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(715);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-1999-0129");
@@ -40,10 +42,8 @@
 via a .forward or :include: file.
 
 Solution : Install sendmail newer than 8.8.4 or install a vendor
-supplied patch.
+supplied patch.";
 
-Risk factor: Medium (Local) / None (remote with no account)";
-
  script_description(desc);
 
 

Modified: trunk/openvas-plugins/scripts/sitescope_management_server.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sitescope_management_server.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sitescope_management_server.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,7 +26,9 @@
 if(description)
 {
  script_id(10740); 
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"Low");
  name = "SiteScope Web Managegment Server Detect";
  script_name(name);
@@ -41,10 +43,8 @@
 LDAP configuration, access to internal servers (via Diagnostic tools), etc.
 
 Solution: Disable the SiteScope Managment web server if it is unnecessary, 
-or block incoming traffic to this port.
+or block incoming traffic to this port.";
 
-Risk factor : Low";
-
  script_description(desc);
 
  summary = "SiteScope Web Management Server Detect";

Modified: trunk/openvas-plugins/scripts/sles10_curl0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_curl0.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles10_curl0.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65903);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2009-2417");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for curl");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for curl");


Property changes on: trunk/openvas-plugins/scripts/sles10_curl0.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_freetype20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_freetype20.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles10_freetype20.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,7 +29,9 @@
 if(description)
 {
  script_id(65875);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for freetype2,");
 
@@ -46,10 +48,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for freetype2,");


Property changes on: trunk/openvas-plugins/scripts/sles10_freetype20.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_nagios.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_nagios.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles10_nagios.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65932);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2009-2288");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for nagios");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for nagios");


Property changes on: trunk/openvas-plugins/scripts/sles10_nagios.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_struts.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_struts.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles10_struts.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,7 +29,9 @@
 if(description)
 {
  script_id(65898);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES10: Security update for Java Struts");
 
@@ -48,10 +50,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for Java Struts");


Property changes on: trunk/openvas-plugins/scripts/sles10_struts.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_gstreamer-0_10-.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_gstreamer-0_10-.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles11_gstreamer-0_10-.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65645);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-0586");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for gstreamer");
@@ -53,10 +55,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for gstreamer");


Property changes on: trunk/openvas-plugins/scripts/sles11_gstreamer-0_10-.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_openswan1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_openswan1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles11_openswan1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65724);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-2661");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for openswan");
@@ -51,10 +53,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for openswan");


Property changes on: trunk/openvas-plugins/scripts/sles11_openswan1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5009158.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009158.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5009158.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65488);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-2919", "CVE-2005-2920");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for clamav");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for clamav");


Property changes on: trunk/openvas-plugins/scripts/sles9p5009158.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5010873.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010873.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5010873.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65233);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for XFree86-Xvnc");
 
@@ -45,10 +47,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for XFree86-Xvnc");


Property changes on: trunk/openvas-plugins/scripts/sles9p5010873.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5013151.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013151.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5013151.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65099);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-0094", "CVE-2005-0095", "CVE-2005-0096", "CVE-2005-0097");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for squid");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for squid");


Property changes on: trunk/openvas-plugins/scripts/sles9p5013151.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5014940.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5014940.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5014940.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65404);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2004-0687", "CVE-2004-0688");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for OpenMotif");
@@ -51,10 +53,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for OpenMotif");


Property changes on: trunk/openvas-plugins/scripts/sles9p5014940.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5019505.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019505.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5019505.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65248);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2006-4924", "CVE-2006-4925", "CVE-2006-5051", "CVE-2006-5052");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for OpenSSH");
@@ -50,10 +52,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for OpenSSH");


Property changes on: trunk/openvas-plugins/scripts/sles9p5019505.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5020179.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020179.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5020179.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65090);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for OpenWBEM");
 
@@ -46,10 +48,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for OpenWBEM");


Property changes on: trunk/openvas-plugins/scripts/sles9p5020179.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5020445.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020445.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5020445.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65064);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for mailman");
 
@@ -45,10 +47,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for mailman");


Property changes on: trunk/openvas-plugins/scripts/sles9p5020445.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5021923.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5021923.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5021923.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65420);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2006-4484");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for perl-Tk");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for perl-Tk");


Property changes on: trunk/openvas-plugins/scripts/sles9p5021923.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5049760.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5049760.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/sles9p5049760.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65559);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2009-0196", "CVE-2009-0792", "CVE-2007-6725");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for GhostScript");
@@ -56,10 +58,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for GhostScript");


Property changes on: trunk/openvas-plugins/scripts/sles9p5049760.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/smb_reg_service_pack_XP.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -32,11 +32,9 @@
 
 By reading the registry key HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CSDVersion
 it was possible to determine the Service Pack version of the Windows XP
-system.
+system.";
 
-Risk factor: Critical";
 
-
  desc_hole = "
 Synopsis :
 
@@ -61,8 +59,10 @@
 if(description)
 {
  script_id(11119);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(10897, 11202);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_cve_id("CVE-1999-0662");

Modified: trunk/openvas-plugins/scripts/snitz_forums_2000_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/snitz_forums_2000_sql_injection.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/snitz_forums_2000_sql_injection.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -26,12 +26,14 @@
 if (description)
 {
 script_id(14227);
+script_version("$Revision$");
+script_tag(name:"last_modification", value:"$Date$");
+script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 script_bugtraq_id(7549);
  script_cve_id("CVE-2003-0286");
  script_xref(name:"OSVDB", value:"4638");
 
  script_name("Snitz Forums 2000 SQL injection");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  desc = "
@@ -50,10 +52,8 @@
 system commands through common SQL stored procedures such 
 as xp_cmdshell.
 
-Solution: Upgrade to version 3.4.03 or higher
+Solution: Upgrade to version 3.4.03 or higher";
 
-Risk factor : High";
-
  script_description(desc);
  script_summary("Determine Snitz forums version");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/snmp_default_communities.nasl
===================================================================
--- trunk/openvas-plugins/scripts/snmp_default_communities.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/snmp_default_communities.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -63,8 +63,10 @@
 if(description)
 {
  script_id(10264);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681, 986);
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_xref(name:"IAVA", value:"2001-B-0001");

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63224);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)");
  script_cve_id("CVE-2008-3831", "CVE-2008-4554", "CVE-2008-4933", "CVE-2008-5025", "CVE-2008-5029", "CVE-2008-5079", "CVE-2008-5182", "CVE-2008-5300", "CVE-2008-5700", "CVE-2008-5702");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  name = "SuSE Security Advisory SUSE-SA:2009:003 (kernel-debug)";
@@ -51,10 +53,8 @@
 Update your system with the packages as indicated in
 the referenced security advisory.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:003
+https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:003";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "SuSE Security Advisory SUSE-SA:2009:003 (kernel-debug)";


Property changes on: trunk/openvas-plugins/scripts/suse_sa_2009_003.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_700_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_700_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ubuntu_700_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(63075);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-12-29 22:42:24 +0100 (Mon, 29 Dec 2008)");
  script_cve_id("CVE-2007-4829", "CVE-2008-1927", "CVE-2008-5302", "CVE-2008-5303");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
  name = "Ubuntu USN-700-1 (perl)";
@@ -84,10 +86,8 @@
 In general, a standard system upgrade is sufficient to effect the
 necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-700-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-700-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Ubuntu USN-700-1 (perl)";


Property changes on: trunk/openvas-plugins/scripts/ubuntu_700_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ubuntu_873_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_873_1.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/ubuntu_873_1.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66605);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)");
  script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Ubuntu USN-873-1 (xulrunner-1.9)");
@@ -81,10 +83,8 @@
 After a standard system upgrade you need to restart Firefox and any
 applications that use xulrunner to effect the necessary changes.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=USN-873-1
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-873-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Ubuntu USN-873-1 (xulrunner-1.9)");


Property changes on: trunk/openvas-plugins/scripts/ubuntu_873_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/vbulletin_init_php_flaw.nasl
===================================================================
--- trunk/openvas-plugins/scripts/vbulletin_init_php_flaw.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/vbulletin_init_php_flaw.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(16203);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(12299);
- script_version("$Revision$");
  script_tag(name:"risk_factor", value:"Medium");
  
  name = "vBulletin Init.PHP unspecified vulnerability";
@@ -47,8 +49,7 @@
 *** this might be a false positive
 
 See also : http://secunia.com/advisories/13901/
-Solution : Upgrade to vBulletin 3.0.5 or newer
-Risk factor : Medium";
+Solution : Upgrade to vBulletin 3.0.5 or newer";
 
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/webfileexplorer_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/webfileexplorer_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/webfileexplorer_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -32,14 +32,14 @@
   system.
 
  See also:
-  http://www.webfileexplorer.com/
+  http://www.webfileexplorer.com/";
 
- Risk factor : None";
-
 if (description)
 {
  script_id(100136);
- script_version ("1.0");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-16 19:20:22 +0200 (Thu, 16 Apr 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("WebFileExplorer Detection");  


Property changes on: trunk/openvas-plugins/scripts/webfileexplorer_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/zabbix_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zabbix_detect.nasl	2011-11-09 14:31:41 UTC (rev 12067)
+++ trunk/openvas-plugins/scripts/zabbix_detect.nasl	2011-11-09 15:17:13 UTC (rev 12068)
@@ -30,14 +30,14 @@
 open source distributed monitoring solution. 
 
 See also:
-http://www.zabbix.com
+http://www.zabbix.com";
 
-Risk factor : None";
-
 if (description)
 {
  script_id(100403);
- script_version ("1.0-$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-17 19:46:08 +0100 (Thu, 17 Dec 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("ZABBIX Server Detection");


Property changes on: trunk/openvas-plugins/scripts/zabbix_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision



More information about the Openvas-commits mailing list