[Openvas-commits] r12074 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Nov 9 17:12:23 CET 2011


Author: hdoreau
Date: 2011-11-09 17:10:49 +0100 (Wed, 09 Nov 2011)
New Revision: 12074

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/404_path_disclosure.nasl
   trunk/openvas-plugins/scripts/OpenX_37110.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0269.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1134.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1185.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl
   trunk/openvas-plugins/scripts/awstats_detect.nasl
   trunk/openvas-plugins/scripts/cgiwebupdate.nasl
   trunk/openvas-plugins/scripts/cyrus_imsp_overflow.nasl
   trunk/openvas-plugins/scripts/deb_1034_1.nasl
   trunk/openvas-plugins/scripts/deb_1036_1.nasl
   trunk/openvas-plugins/scripts/deb_1037_1.nasl
   trunk/openvas-plugins/scripts/deb_1045_1.nasl
   trunk/openvas-plugins/scripts/deb_1215_1.nasl
   trunk/openvas-plugins/scripts/deb_121_1.nasl
   trunk/openvas-plugins/scripts/deb_1282_1.nasl
   trunk/openvas-plugins/scripts/deb_1338_1.nasl
   trunk/openvas-plugins/scripts/deb_1478_1.nasl
   trunk/openvas-plugins/scripts/deb_1492_1.nasl
   trunk/openvas-plugins/scripts/deb_1523_1.nasl
   trunk/openvas-plugins/scripts/deb_1545_1.nasl
   trunk/openvas-plugins/scripts/deb_1622_1.nasl
   trunk/openvas-plugins/scripts/deb_1650_1.nasl
   trunk/openvas-plugins/scripts/deb_1679_1.nasl
   trunk/openvas-plugins/scripts/deb_1724_1.nasl
   trunk/openvas-plugins/scripts/deb_1798_1.nasl
   trunk/openvas-plugins/scripts/deb_191_1.nasl
   trunk/openvas-plugins/scripts/deb_2022_1.nasl
   trunk/openvas-plugins/scripts/deb_2155_1.nasl
   trunk/openvas-plugins/scripts/deb_2160_1.nasl
   trunk/openvas-plugins/scripts/deb_2204_1.nasl
   trunk/openvas-plugins/scripts/deb_2213_1.nasl
   trunk/openvas-plugins/scripts/deb_241_1.nasl
   trunk/openvas-plugins/scripts/deb_245_1.nasl
   trunk/openvas-plugins/scripts/deb_267_2.nasl
   trunk/openvas-plugins/scripts/deb_431_2.nasl
   trunk/openvas-plugins/scripts/deb_528_1.nasl
   trunk/openvas-plugins/scripts/deb_536_1.nasl
   trunk/openvas-plugins/scripts/deb_671_1.nasl
   trunk/openvas-plugins/scripts/deb_768_1.nasl
   trunk/openvas-plugins/scripts/deb_779_2.nasl
   trunk/openvas-plugins/scripts/deb_833_1.nasl
   trunk/openvas-plugins/scripts/deb_963_1.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12444.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1525.nasl
   trunk/openvas-plugins/scripts/fcore_2009_1914.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3410.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5368.nasl
   trunk/openvas-plugins/scripts/fcore_2009_5969.nasl
   trunk/openvas-plugins/scripts/fortigate_detect.nasl
   trunk/openvas-plugins/scripts/freebsd_apache12.nasl
   trunk/openvas-plugins/scripts/freebsd_courier-imap.nasl
   trunk/openvas-plugins/scripts/freebsd_exim.nasl
   trunk/openvas-plugins/scripts/freebsd_gallery20.nasl
   trunk/openvas-plugins/scripts/freebsd_gedit.nasl
   trunk/openvas-plugins/scripts/freebsd_imap-uw2.nasl
   trunk/openvas-plugins/scripts/freebsd_joomla1.nasl
   trunk/openvas-plugins/scripts/freebsd_krb511.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-opera7.nasl
   trunk/openvas-plugins/scripts/freebsd_mod_security.nasl
   trunk/openvas-plugins/scripts/freebsd_opera14.nasl
   trunk/openvas-plugins/scripts/freebsd_p5-File-Path.nasl
   trunk/openvas-plugins/scripts/freebsd_pcre0.nasl
   trunk/openvas-plugins/scripts/freebsd_png4.nasl
   trunk/openvas-plugins/scripts/freebsd_ruby2.nasl
   trunk/openvas-plugins/scripts/freebsd_tcpdump.nasl
   trunk/openvas-plugins/scripts/freebsd_tiff5.nasl
   trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl
   trunk/openvas-plugins/scripts/freebsd_websvn.nasl
   trunk/openvas-plugins/scripts/freebsd_zoo.nasl
   trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl
   trunk/openvas-plugins/scripts/freebsdsa_bind6.nasl
   trunk/openvas-plugins/scripts/freebsdsa_ipfw1.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0058_libsmi_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0177_evolution_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2008_0223_seamonkey_centos3_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0057_squirrelmail_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2009_0411_device-mapper-multipath_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0400_tetex_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2010_0603_gnupg2_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0682-01_thunderbird.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2010_0976-01_bind.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_0305-01_samba.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_0310-01_firefox.nasl
   trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_win_may11.nasl
   trunk/openvas-plugins/scripts/gb_apache_49957.nasl
   trunk/openvas-plugins/scripts/gb_apple_safari_mult_vuln_jun10.nasl
   trunk/openvas-plugins/scripts/gb_ccproxy_connection_req_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_clanlite_sql_inj_n_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_067_mono_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_1099_gimp_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2697_galeon_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_2969_mono_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_3255_perl_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_712_kernel_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_737_xen_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2007_757_htdig_fc6.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_0506_tog-pegasus_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_0904_bind_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_10638_samba_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_11208_phpMyAdmin_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_1758_dnssec-tools_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_2370_roundup_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_2812_seamonkey_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_3010_pdns-recursor_fc7.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_6127_liferea_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_6140_bluez-utils_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_6491_epiphany-extensions_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_7463_wordpress_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8069_ssmtp_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8073_fedora-package-config-smart_fc9.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygems_fc8.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_0601_php-ZendFramework_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_10344_xulrunner_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_1219_bltk_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_12481_znc_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_13702_libmikmod_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_19193_opensc_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_2762_curl_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_3787_drupal_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_4318_trac_fc12.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_6077_kdebase_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_8273_texlive_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2010_8547_kdebase_fc11.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_0111_feh_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_0650_tor_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_1958_q_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_4897_dhcp_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_6205_firefox_fc13.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_7822_gdm_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8421_xen_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_8494_rubygem-activesupport_fc15.nasl
   trunk/openvas-plugins/scripts/gb_filecopa_ftp_server_detect.nasl
   trunk/openvas-plugins/scripts/gb_goldenftp_pass_cmd_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_win.nasl
   trunk/openvas-plugins/scripts/gb_graphicsmagick_mult_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl
   trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02655.nasl
   trunk/openvas-plugins/scripts/gb_ideal_administrator_detect.nasl
   trunk/openvas-plugins/scripts/gb_limny_detect.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_030.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_092.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_136.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_004.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_067.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_068.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_083.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_230.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_137.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_097.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_152.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_162.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_180.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_060.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_112.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl
   trunk/openvas-plugins/scripts/gb_ms_ie_npl_info_disc_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ms_iis_ftpd_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_multicms_46062.nasl
   trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win_dec10.nasl
   trunk/openvas-plugins/scripts/gb_phorum_xss_n_csrf_vuln.nasl
   trunk/openvas-plugins/scripts/gb_postnuke_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_jun09_lin.nasl
   trunk/openvas-plugins/scripts/gb_simple_machines_forum_detect.nasl
   trunk/openvas-plugins/scripts/gb_snort_detect_lin.nasl
   trunk/openvas-plugins/scripts/gb_solaris_109454_06.nasl
   trunk/openvas-plugins/scripts/gb_solaris_110416_07.nasl
   trunk/openvas-plugins/scripts/gb_solaris_114046_03.nasl
   trunk/openvas-plugins/scripts/gb_solaris_114674_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_116775_03.nasl
   trunk/openvas-plugins/scripts/gb_solaris_117350_62.nasl
   trunk/openvas-plugins/scripts/gb_solaris_122092_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_137402_02.nasl
   trunk/openvas-plugins/scripts/gb_solaris_138387_01.nasl
   trunk/openvas-plugins/scripts/gb_solaris_140102_01.nasl
   trunk/openvas-plugins/scripts/gb_sun_java_se_unspecified_vuln_aug09.nasl
   trunk/openvas-plugins/scripts/gb_suse_2008_056.nasl
   trunk/openvas-plugins/scripts/gb_tugzip_file_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1053_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1057_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1108_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1148_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1159_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1180_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1218_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1222_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1244_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_444_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_454_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_483_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_522_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_537_2.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_11.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_622_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_631_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_634_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_640_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_662_1.nasl
   trunk/openvas-plugins/scripts/gb_v-webmail_detect.nasl
   trunk/openvas-plugins/scripts/gb_vlc_media_player_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_vlc_media_player_intgr_bof_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_winamp_gen_msn_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_wireshark_dissector_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_wordpress_mult_themes_xss_vuln.nasl
   trunk/openvas-plugins/scripts/gb_xwiki_enterprise_detect.nasl
   trunk/openvas-plugins/scripts/glsa_200310_03.nasl
   trunk/openvas-plugins/scripts/glsa_200402_01.nasl
   trunk/openvas-plugins/scripts/glsa_200405_25.nasl
   trunk/openvas-plugins/scripts/glsa_200408_01.nasl
   trunk/openvas-plugins/scripts/glsa_200408_14.nasl
   trunk/openvas-plugins/scripts/glsa_200409_19.nasl
   trunk/openvas-plugins/scripts/glsa_200411_30.nasl
   trunk/openvas-plugins/scripts/glsa_200502_32.nasl
   trunk/openvas-plugins/scripts/glsa_200504_03.nasl
   trunk/openvas-plugins/scripts/glsa_200510_08.nasl
   trunk/openvas-plugins/scripts/glsa_200511_17.nasl
   trunk/openvas-plugins/scripts/glsa_200512_02.nasl
   trunk/openvas-plugins/scripts/glsa_200512_05.nasl
   trunk/openvas-plugins/scripts/glsa_200601_01.nasl
   trunk/openvas-plugins/scripts/glsa_200603_23.nasl
   trunk/openvas-plugins/scripts/glsa_200604_04.nasl
   trunk/openvas-plugins/scripts/glsa_200605_06.nasl
   trunk/openvas-plugins/scripts/glsa_200605_15.nasl
   trunk/openvas-plugins/scripts/glsa_200609_14.nasl
   trunk/openvas-plugins/scripts/glsa_200611_25.nasl
   trunk/openvas-plugins/scripts/glsa_200703_26.nasl
   trunk/openvas-plugins/scripts/glsa_200803_12.nasl
   trunk/openvas-plugins/scripts/glsa_200812_15.nasl
   trunk/openvas-plugins/scripts/glsa_200907_06.nasl
   trunk/openvas-plugins/scripts/glsa_201009_09.nasl
   trunk/openvas-plugins/scripts/glsa_201012_01.nasl
   trunk/openvas-plugins/scripts/hpftp_glob_stat.nasl
   trunk/openvas-plugins/scripts/ilohamail_arbitrary_file_access_via_lang.nasl
   trunk/openvas-plugins/scripts/interchange_detect.nasl
   trunk/openvas-plugins/scripts/invision_power_board_calendar_sql_injection.nasl
   trunk/openvas-plugins/scripts/ion_p.nasl
   trunk/openvas-plugins/scripts/linksys_ap_default_password.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_079.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_220.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_284.nasl
   trunk/openvas-plugins/scripts/minibb_rfi.nasl
   trunk/openvas-plugins/scripts/mycio_detect.nasl
   trunk/openvas-plugins/scripts/netware_tomcat_sourcecode_viewer.nasl
   trunk/openvas-plugins/scripts/nsd_version.nasl
   trunk/openvas-plugins/scripts/open_media_collectors_database_37941.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1513.nasl
   trunk/openvas-plugins/scripts/phorum_35134.nasl
   trunk/openvas-plugins/scripts/phpbb_sql_injection3.nasl
   trunk/openvas-plugins/scripts/phpgroupware_message_script_inject.nasl
   trunk/openvas-plugins/scripts/remote-detect-ApacheOfbiz.nasl
   trunk/openvas-plugins/scripts/remote-web-w3af.nasl
   trunk/openvas-plugins/scripts/roxen_counter.nasl
   trunk/openvas-plugins/scripts/secpod_asterisk_sip_channel_driver_dos_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_bloggeruniverse_sql_injection_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_cyrus_sasllib_mul_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_euphonics_player_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ms09-062.nasl
   trunk/openvas-plugins/scripts/secpod_ms10-071.nasl
   trunk/openvas-plugins/scripts/secpod_nero_showtime_remote_bof_vuln_900410.nasl
   trunk/openvas-plugins/scripts/secpod_ntp_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/secpod_pidgin_mult_dos_vuln_lin.nasl
   trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_winamp_mult_bof_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl
   trunk/openvas-plugins/scripts/securecrt_remote_overflow.nasl
   trunk/openvas-plugins/scripts/simple_form_mail_relaying_via_subject_tags.nasl
   trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd0.nasl
   trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl
   trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl
   trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl
   trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl
   trunk/openvas-plugins/scripts/sles11_openswan0.nasl
   trunk/openvas-plugins/scripts/sles9p5009598.nasl
   trunk/openvas-plugins/scripts/sles9p5010087.nasl
   trunk/openvas-plugins/scripts/sles9p5010516.nasl
   trunk/openvas-plugins/scripts/sles9p5012275.nasl
   trunk/openvas-plugins/scripts/sles9p5012800.nasl
   trunk/openvas-plugins/scripts/sles9p5013352.nasl
   trunk/openvas-plugins/scripts/sles9p5018245.nasl
   trunk/openvas-plugins/scripts/sles9p5019072.nasl
   trunk/openvas-plugins/scripts/sles9p5019980.nasl
   trunk/openvas-plugins/scripts/sles9p5020047.nasl
   trunk/openvas-plugins/scripts/sles9p5024260.nasl
   trunk/openvas-plugins/scripts/sles9p5062132.nasl
   trunk/openvas-plugins/scripts/smb_nt_ms03-009.nasl
   trunk/openvas-plugins/scripts/smtp_backdoor.nasl
   trunk/openvas-plugins/scripts/smtp_too_long_line.nasl
   trunk/openvas-plugins/scripts/support_incident_tracker_37949.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_045.nasl
   trunk/openvas-plugins/scripts/uebimiau_session_disclosure.nasl
   trunk/openvas-plugins/scripts/weblogic_percent.nasl
   trunk/openvas-plugins/scripts/xm_easy_ftp_37008.nasl
   trunk/openvas-plugins/scripts/xtux_server.nasl
Log:
* scripts/sles9p5018245.nasl,
scripts/deb_1523_1.nasl,
scripts/gb_winamp_gen_msn_bof_vuln.nasl,
scripts/freebsd_webkit-gtk2.nasl,
scripts/gb_snort_detect_lin.nasl,
scripts/gb_mandriva_MDVSA_2011_060.nasl,
scripts/mycio_detect.nasl,
scripts/smtp_too_long_line.nasl,
scripts/cyrus_imsp_overflow.nasl,
scripts/deb_191_1.nasl,
scripts/invision_power_board_calendar_sql_injection.nasl,
scripts/open_media_collectors_database_37941.nasl,
scripts/gb_solaris_114046_03.nasl,
scripts/sles9p5013352.nasl,
scripts/gb_graphicsmagick_mult_vuln_lin.nasl,
scripts/fcore_2009_3410.nasl,
scripts/deb_241_1.nasl,
scripts/gb_solaris_110416_07.nasl,
scripts/deb_671_1.nasl,
scripts/gb_solaris_116775_03.nasl,
scripts/glsa_200512_05.nasl,
scripts/gb_ms_ie_npl_info_disc_vuln.nasl,
scripts/gb_fedora_2010_4318_trac_fc12.nasl,
scripts/deb_245_1.nasl,
scripts/gb_fedora_2010_1219_bltk_fc12.nasl,
scripts/deb_2155_1.nasl,
scripts/gb_fedora_2008_8073_fedora-package-config-smart_fc9.nasl,
scripts/gb_postnuke_sql_inj_vuln.nasl,
scripts/phpbb_sql_injection3.nasl,
scripts/deb_1282_1.nasl,
scripts/gb_wireshark_dissector_dos_vuln_win.nasl,
scripts/glsa_200310_03.nasl,
scripts/gb_fedora_2010_12481_znc_fc13.nasl,
scripts/gb_RHSA-2010_0976-01_bind.nasl,
scripts/gb_fedora_2008_10638_samba_fc8.nasl,
scripts/deb_1679_1.nasl,
scripts/deb_1650_1.nasl,
scripts/deb_1478_1.nasl,
scripts/freebsd_zoo.nasl,
scripts/sles9p5012800.nasl,
scripts/gb_ubuntu_USN_622_1.nasl,
scripts/secpod_ms09-062.nasl,
scripts/gb_fedora_2007_757_htdig_fc6.nasl,
scripts/glsa_200411_30.nasl,
scripts/weblogic_percent.nasl,
scripts/gb_fedora_2010_13702_libmikmod_fc13.nasl,
scripts/sles9p5010087.nasl,
scripts/sles11_openswan0.nasl,
scripts/deb_1215_1.nasl,
scripts/deb_536_1.nasl,
scripts/fcore_2009_5969.nasl,
scripts/deb_2213_1.nasl,
scripts/sles9p5009598.nasl,
scripts/glsa_200408_01.nasl,
scripts/fcore_2009_12444.nasl,
scripts/xm_easy_ftp_37008.nasl,
scripts/gb_fedora_2011_8421_xen_fc15.nasl,
scripts/freebsd_ruby2.nasl,
scripts/gb_mandriva_MDVA_2010_230.nasl,
scripts/secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl,
scripts/netware_tomcat_sourcecode_viewer.nasl,
scripts/smtp_backdoor.nasl,
scripts/gb_fedora_2010_10344_xulrunner_fc12.nasl,
scripts/secpod_cyrus_sasllib_mul_bof_vuln.nasl,
scripts/gb_solaris_138387_01.nasl,
scripts/gb_solaris_117350_62.nasl,
scripts/secpod_ntp_bof_vuln.nasl,
scripts/gb_tugzip_file_bof_vuln.nasl,
scripts/gb_fedora_2011_7822_gdm_fc15.nasl,
scripts/xtux_server.nasl,
scripts/gb_CESA-2010_0603_gnupg2_centos5_i386.nasl,
scripts/freebsd_gallery20.nasl,
scripts/deb_1545_1.nasl,
scripts/glsa_201009_09.nasl,
scripts/glsa_200703_26.nasl,
scripts/freebsd_websvn.nasl,
scripts/freebsd_tcpdump.nasl,
scripts/deb_2022_1.nasl,
scripts/gb_ccproxy_connection_req_bof_vuln.nasl,
scripts/secpod_opera_mult_dos_vuln_win.nasl,
scripts/deb_1034_1.nasl,
scripts/sles9p5010516.nasl,
scripts/freebsd_courier-imap.nasl,
scripts/gb_fedora_2011_4897_dhcp_fc14.nasl,
scripts/deb_1045_1.nasl,
scripts/nsd_version.nasl,
scripts/deb_833_1.nasl,
scripts/deb_963_1.nasl,
scripts/mdksa_2009_220.nasl,
scripts/gb_CESA-2010_0360_wireshark_centos5_i386.nasl,
scripts/gb_solaris_137402_02.nasl,
scripts/freebsd_mod_security.nasl,
scripts/gb_xwiki_enterprise_detect.nasl,
scripts/freebsd_gedit.nasl,
scripts/gb_opera_mult_vuln_win_dec10.nasl,
scripts/hpftp_glob_stat.nasl,
scripts/freebsdsa_ipfw1.nasl,
scripts/gb_mandriva_MDVSA_2010_152.nasl,
scripts/gb_apple_safari_mult_vuln_jun10.nasl,
scripts/minibb_rfi.nasl,
scripts/gb_filecopa_ftp_server_detect.nasl,
scripts/RHSA_2009_1432.nasl,
scripts/gb_fedora_2008_1758_dnssec-tools_fc7.nasl,
scripts/gb_CESA-2008_0177_evolution_centos4_i386.nasl,
scripts/gb_fedora_2010_19193_opensc_fc13.nasl,
scripts/gb_ubuntu_USN_634_1.nasl,
scripts/gb_fedora_2011_0111_feh_fc14.nasl,
scripts/gb_seamonkey_mult_vuln_jun09_lin.nasl,
scripts/freebsd_opera14.nasl,
scripts/gb_ubuntu_USN_1159_1.nasl,
scripts/ovcesa2009_1513.nasl,
scripts/gb_vlc_media_player_dos_vuln_win.nasl,
scripts/sles10_librpcsecgss.nasl,
scripts/deb_1622_1.nasl,
scripts/RHSA_2009_1185.nasl,
scripts/remote-web-w3af.nasl,
scripts/glsa_200603_23.nasl,
scripts/gb_clanlite_sql_inj_n_xss_vuln.nasl,
scripts/secpod_winamp_mult_bof_vuln.nasl,
scripts/deb_121_1.nasl,
scripts/fcore_2009_1914.nasl,
scripts/gb_mandriva_MDKA_2007_030.nasl,
scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl,
scripts/sles11_mozilla-xulrunn.nasl,
scripts/gb_CESA-2010_0400_tetex_centos5_i386.nasl,
scripts/fcore_2009_5368.nasl,
scripts/gb_graphicsmagick_detect_win.nasl,
scripts/gb_solaris_109454_06.nasl,
scripts/glsa_200502_32.nasl,
scripts/gb_fedora_2008_6491_epiphany-extensions_fc8.nasl,
scripts/gb_CESA-2008_0223_seamonkey_centos3_i386.nasl,
scripts/gb_fedora_2008_0904_bind_fc7.nasl,
scripts/gb_fedora_2007_2697_galeon_fc7.nasl,
scripts/deb_779_2.nasl,
scripts/securecrt_remote_overflow.nasl,
scripts/gb_CESA-2009_0057_squirrelmail_centos4_i386.nasl,
scripts/gb_fedora_2011_8494_rubygem-activesupport_fc15.nasl,
scripts/sles9p5019072.nasl,
scripts/glsa_200812_15.nasl,
scripts/RHSA_2009_1504.nasl,
scripts/gb_ubuntu_USN_444_1.nasl,
scripts/sles10_websphere-as_ce.nasl,
scripts/gb_ubuntu_USN_454_1.nasl,
scripts/glsa_200605_06.nasl,
scripts/phpgroupware_message_script_inject.nasl,
scripts/gb_ubuntu_USN_612_11.nasl,
scripts/glsa_200512_02.nasl,
scripts/gb_hp_ux_HPSBUX00165.nasl,
scripts/RHSA_2009_0269.nasl,
scripts/ilohamail_arbitrary_file_access_via_lang.nasl,
scripts/sles10_kdegraphics3-pd0.nasl,
scripts/404_path_disclosure.nasl,
scripts/gb_mandriva_MDVA_2008_068.nasl,
scripts/suse_sa_2009_045.nasl,
scripts/gb_ubuntu_USN_1053_1.nasl,
scripts/glsa_200510_08.nasl,
scripts/simple_form_mail_relaying_via_subject_tags.nasl,
scripts/glsa_200408_14.nasl,
scripts/gb_mandriva_MDVSA_2011_112.nasl,
scripts/gb_suse_2008_056.nasl,
scripts/gb_mandriva_MDVSA_2010_180.nasl,
scripts/freebsd_apache12.nasl,
scripts/sles9p5019980.nasl,
scripts/gb_apache_49957.nasl,
scripts/gb_solaris_140102_01.nasl,
scripts/deb_768_1.nasl,
scripts/gb_fedora_2008_0506_tog-pegasus_fc7.nasl,
scripts/gb_ubuntu_USN_1180_1.nasl,
scripts/gb_CESA-2009_0411_device-mapper-multipath_centos4_i386.nasl,
scripts/gb_RHSA-2011_0305-01_samba.nasl,
scripts/gb_fedora_2008_8282_rubygems_fc8.nasl,
scripts/deb_1724_1.nasl,
scripts/gb_mandriva_MDKA_2007_092.nasl,
scripts/roxen_counter.nasl,
scripts/uebimiau_session_disclosure.nasl,
scripts/gb_fedora_2007_067_mono_fc6.nasl,
scripts/gb_ubuntu_USN_1108_2.nasl,
scripts/gb_mandriva_MDVSA_2010_162.nasl,
scripts/gb_CESA-2008_0058_libsmi_centos4_i386.nasl,
scripts/fortigate_detect.nasl,
scripts/gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl,
scripts/glsa_200601_01.nasl,
scripts/sles9p5024260.nasl,
scripts/fcore_2009_1525.nasl,
scripts/remote-detect-ApacheOfbiz.nasl,
scripts/glsa_200803_12.nasl,
scripts/freebsd_exim.nasl,
scripts/gb_ubuntu_USN_1222_2.nasl,
scripts/gb_mandriva_MDKSA_2007_136.nasl,
scripts/gb_fedora_2010_6077_kdebase_fc11.nasl,
scripts/gb_ubuntu_USN_1218_1.nasl,
scripts/deb_431_2.nasl,
scripts/freebsdsa_bind6.nasl,
scripts/secpod_pidgin_mult_dos_vuln_lin.nasl,
scripts/gb_fedora_2008_7463_wordpress_fc8.nasl,
scripts/gb_ubuntu_USN_483_1.nasl,
scripts/secpod_bloggeruniverse_sql_injection_vuln.nasl,
scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl,
scripts/deb_267_2.nasl,
scripts/interchange_detect.nasl,
scripts/gb_fedora_2008_6140_bluez-utils_fc8.nasl,
scripts/OpenX_37110.nasl,
scripts/freebsd_png4.nasl,
scripts/gb_fedora_2007_712_kernel_fc6.nasl,
scripts/glsa_200611_25.nasl,
scripts/RHSA_2009_1134.nasl,
scripts/freebsd_tiff5.nasl,
scripts/gb_hp_ux_HPSBUX00303.nasl,
scripts/freebsd_krb511.nasl,
scripts/awstats_detect.nasl,
scripts/gb_ubuntu_USN_631_1.nasl,
scripts/secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl,
scripts/glsa_200402_01.nasl,
scripts/gb_limny_detect.nasl,
scripts/gb_fedora_2010_2762_curl_fc12.nasl,
scripts/deb_1798_1.nasl,
scripts/gb_solaris_122092_01.nasl,
scripts/gb_fedora_2007_1099_gimp_fc7.nasl,
scripts/freebsd_linux-opera7.nasl,
scripts/glsa_200609_14.nasl,
scripts/gb_fedora_2011_6205_firefox_fc13.nasl,
scripts/gb_goldenftp_pass_cmd_bof_vuln.nasl,
scripts/support_incident_tracker_37949.nasl,
scripts/glsa_200405_25.nasl,
scripts/deb_2160_1.nasl,
scripts/glsa_200604_04.nasl,
scripts/gb_fedora_2008_11208_phpMyAdmin_fc9.nasl,
scripts/sles9p5020047.nasl,
scripts/gb_ubuntu_USN_1148_1.nasl,
scripts/secpod_nero_showtime_remote_bof_vuln_900410.nasl,
scripts/gb_fedora_2008_8069_ssmtp_fc9.nasl,
scripts/gb_fedora_2011_1958_q_fc13.nasl,
scripts/gb_mandriva_MDVA_2008_083.nasl,
scripts/gb_fedora_2010_8547_kdebase_fc11.nasl,
scripts/gb_fedora_2008_2370_roundup_fc7.nasl,
scripts/gb_mandriva_MDVA_2008_004.nasl,
scripts/secpod_euphonics_player_bof_vuln.nasl,
scripts/deb_1338_1.nasl,
scripts/gb_fedora_2011_0650_tor_fc13.nasl,
scripts/gb_vlc_media_player_intgr_bof_vuln_win.nasl,
scripts/freebsdsa_bind10.nasl,
scripts/gb_wordpress_mult_themes_xss_vuln.nasl,
scripts/gb_multicms_46062.nasl,
scripts/sles9p5062132.nasl,
scripts/gb_fedora_2008_3010_pdns-recursor_fc7.nasl,
scripts/gb_v-webmail_detect.nasl,
scripts/gb_fedora_2010_0601_php-ZendFramework_fc11.nasl,
scripts/freebsd_p5-File-Path.nasl,
scripts/phorum_35134.nasl,
scripts/glsa_200605_15.nasl,
scripts/gb_fedora_2007_737_xen_fc6.nasl,
scripts/gb_ideal_administrator_detect.nasl,
scripts/sles9p5012275.nasl,
scripts/smb_nt_ms03-009.nasl,
scripts/gb_mandriva_MDVSA_2008_137.nasl,
scripts/gb_ubuntu_USN_522_1.nasl,
scripts/gb_ubuntu_USN_537_2.nasl,
scripts/glsa_200907_06.nasl,
scripts/gb_RHSA-2010_0682-01_thunderbird.nasl,
scripts/cgiwebupdate.nasl,
scripts/ion_p.nasl,
scripts/glsa_200504_03.nasl,
scripts/deb_1037_1.nasl,
scripts/gb_mandriva_MDVA_2008_067.nasl,
scripts/gb_ubuntu_USN_662_1.nasl,
scripts/deb_1036_1.nasl,
scripts/glsa_200511_17.nasl,
scripts/gb_phorum_xss_n_csrf_vuln.nasl,
scripts/mdksa_2009_079.nasl,
scripts/gb_ubuntu_USN_640_1.nasl,
scripts/gb_RHSA-2011_0310-01_firefox.nasl,
scripts/linksys_ap_default_password.nasl,
scripts/mdksa_2009_284.nasl,
scripts/gb_fedora_2008_6127_liferea_fc8.nasl,
scripts/freebsd_imap-uw2.nasl,
scripts/gb_fedora_2007_3255_perl_fc7.nasl,
scripts/gb_simple_machines_forum_detect.nasl,
scripts/gb_ms_iis_ftpd_dos_vuln.nasl,
scripts/gb_solaris_114674_01.nasl,
scripts/sles11_ext4dev-kmp-def4.nasl,
scripts/glsa_200409_19.nasl,
scripts/gb_ubuntu_USN_1057_1.nasl,
scripts/deb_1492_1.nasl,
scripts/glsa_201012_01.nasl,
scripts/gb_hp_ux_HPSBUX02351.nasl,
scripts/gb_fedora_2008_2812_seamonkey_fc7.nasl,
scripts/freebsd_joomla1.nasl,
scripts/gb_hp_ux_HPSBUX02655.nasl,
scripts/deb_528_1.nasl,
scripts/gb_fedora_2010_3787_drupal_fc12.nasl,
scripts/secpod_asterisk_sip_channel_driver_dos_vuln.nasl,
scripts/deb_2204_1.nasl,
scripts/gb_fedora_2010_8273_texlive_fc11.nasl,
scripts/gb_adobe_flash_player_mult_vuln_win_may11.nasl,
scripts/secpod_ms10-071.nasl,
scripts/gb_mandriva_MDVSA_2010_097.nasl,
scripts/freebsd_pcre0.nasl,
scripts/gb_fedora_2007_2969_mono_fc8.nasl,
scripts/gb_sun_java_se_unspecified_vuln_aug09.nasl,
scripts/gb_ubuntu_USN_1244_1.nasl:
Updated script metadata (changes for CR56).



Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/ChangeLog	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,5 +1,309 @@
 2011-11-09  Henri Doreau <henri.doreau at greenbone.net>
 
+	* scripts/sles9p5018245.nasl,
+	scripts/deb_1523_1.nasl,
+	scripts/gb_winamp_gen_msn_bof_vuln.nasl,
+	scripts/freebsd_webkit-gtk2.nasl,
+	scripts/gb_snort_detect_lin.nasl,
+	scripts/gb_mandriva_MDVSA_2011_060.nasl,
+	scripts/mycio_detect.nasl,
+	scripts/smtp_too_long_line.nasl,
+	scripts/cyrus_imsp_overflow.nasl,
+	scripts/deb_191_1.nasl,
+	scripts/invision_power_board_calendar_sql_injection.nasl,
+	scripts/open_media_collectors_database_37941.nasl,
+	scripts/gb_solaris_114046_03.nasl,
+	scripts/sles9p5013352.nasl,
+	scripts/gb_graphicsmagick_mult_vuln_lin.nasl,
+	scripts/fcore_2009_3410.nasl,
+	scripts/deb_241_1.nasl,
+	scripts/gb_solaris_110416_07.nasl,
+	scripts/deb_671_1.nasl,
+	scripts/gb_solaris_116775_03.nasl,
+	scripts/glsa_200512_05.nasl,
+	scripts/gb_ms_ie_npl_info_disc_vuln.nasl,
+	scripts/gb_fedora_2010_4318_trac_fc12.nasl,
+	scripts/deb_245_1.nasl,
+	scripts/gb_fedora_2010_1219_bltk_fc12.nasl,
+	scripts/deb_2155_1.nasl,
+	scripts/gb_fedora_2008_8073_fedora-package-config-smart_fc9.nasl,
+	scripts/gb_postnuke_sql_inj_vuln.nasl,
+	scripts/phpbb_sql_injection3.nasl,
+	scripts/deb_1282_1.nasl,
+	scripts/gb_wireshark_dissector_dos_vuln_win.nasl,
+	scripts/glsa_200310_03.nasl,
+	scripts/gb_fedora_2010_12481_znc_fc13.nasl,
+	scripts/gb_RHSA-2010_0976-01_bind.nasl,
+	scripts/gb_fedora_2008_10638_samba_fc8.nasl,
+	scripts/deb_1679_1.nasl,
+	scripts/deb_1650_1.nasl,
+	scripts/deb_1478_1.nasl,
+	scripts/freebsd_zoo.nasl,
+	scripts/sles9p5012800.nasl,
+	scripts/gb_ubuntu_USN_622_1.nasl,
+	scripts/secpod_ms09-062.nasl,
+	scripts/gb_fedora_2007_757_htdig_fc6.nasl,
+	scripts/glsa_200411_30.nasl,
+	scripts/weblogic_percent.nasl,
+	scripts/gb_fedora_2010_13702_libmikmod_fc13.nasl,
+	scripts/sles9p5010087.nasl,
+	scripts/sles11_openswan0.nasl,
+	scripts/deb_1215_1.nasl,
+	scripts/deb_536_1.nasl,
+	scripts/fcore_2009_5969.nasl,
+	scripts/deb_2213_1.nasl,
+	scripts/sles9p5009598.nasl,
+	scripts/glsa_200408_01.nasl,
+	scripts/fcore_2009_12444.nasl,
+	scripts/xm_easy_ftp_37008.nasl,
+	scripts/gb_fedora_2011_8421_xen_fc15.nasl,
+	scripts/freebsd_ruby2.nasl,
+	scripts/gb_mandriva_MDVA_2010_230.nasl,
+	scripts/secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl,
+	scripts/netware_tomcat_sourcecode_viewer.nasl,
+	scripts/smtp_backdoor.nasl,
+	scripts/gb_fedora_2010_10344_xulrunner_fc12.nasl,
+	scripts/secpod_cyrus_sasllib_mul_bof_vuln.nasl,
+	scripts/gb_solaris_138387_01.nasl,
+	scripts/gb_solaris_117350_62.nasl,
+	scripts/secpod_ntp_bof_vuln.nasl,
+	scripts/gb_tugzip_file_bof_vuln.nasl,
+	scripts/gb_fedora_2011_7822_gdm_fc15.nasl,
+	scripts/xtux_server.nasl,
+	scripts/gb_CESA-2010_0603_gnupg2_centos5_i386.nasl,
+	scripts/freebsd_gallery20.nasl,
+	scripts/deb_1545_1.nasl,
+	scripts/glsa_201009_09.nasl,
+	scripts/glsa_200703_26.nasl,
+	scripts/freebsd_websvn.nasl,
+	scripts/freebsd_tcpdump.nasl,
+	scripts/deb_2022_1.nasl,
+	scripts/gb_ccproxy_connection_req_bof_vuln.nasl,
+	scripts/secpod_opera_mult_dos_vuln_win.nasl,
+	scripts/deb_1034_1.nasl,
+	scripts/sles9p5010516.nasl,
+	scripts/freebsd_courier-imap.nasl,
+	scripts/gb_fedora_2011_4897_dhcp_fc14.nasl,
+	scripts/deb_1045_1.nasl,
+	scripts/nsd_version.nasl,
+	scripts/deb_833_1.nasl,
+	scripts/deb_963_1.nasl,
+	scripts/mdksa_2009_220.nasl,
+	scripts/gb_CESA-2010_0360_wireshark_centos5_i386.nasl,
+	scripts/gb_solaris_137402_02.nasl,
+	scripts/freebsd_mod_security.nasl,
+	scripts/gb_xwiki_enterprise_detect.nasl,
+	scripts/freebsd_gedit.nasl,
+	scripts/gb_opera_mult_vuln_win_dec10.nasl,
+	scripts/hpftp_glob_stat.nasl,
+	scripts/freebsdsa_ipfw1.nasl,
+	scripts/gb_mandriva_MDVSA_2010_152.nasl,
+	scripts/gb_apple_safari_mult_vuln_jun10.nasl,
+	scripts/minibb_rfi.nasl,
+	scripts/gb_filecopa_ftp_server_detect.nasl,
+	scripts/RHSA_2009_1432.nasl,
+	scripts/gb_fedora_2008_1758_dnssec-tools_fc7.nasl,
+	scripts/gb_CESA-2008_0177_evolution_centos4_i386.nasl,
+	scripts/gb_fedora_2010_19193_opensc_fc13.nasl,
+	scripts/gb_ubuntu_USN_634_1.nasl,
+	scripts/gb_fedora_2011_0111_feh_fc14.nasl,
+	scripts/gb_seamonkey_mult_vuln_jun09_lin.nasl,
+	scripts/freebsd_opera14.nasl,
+	scripts/gb_ubuntu_USN_1159_1.nasl,
+	scripts/ovcesa2009_1513.nasl,
+	scripts/gb_vlc_media_player_dos_vuln_win.nasl,
+	scripts/sles10_librpcsecgss.nasl,
+	scripts/deb_1622_1.nasl,
+	scripts/RHSA_2009_1185.nasl,
+	scripts/remote-web-w3af.nasl,
+	scripts/glsa_200603_23.nasl,
+	scripts/gb_clanlite_sql_inj_n_xss_vuln.nasl,
+	scripts/secpod_winamp_mult_bof_vuln.nasl,
+	scripts/deb_121_1.nasl,
+	scripts/fcore_2009_1914.nasl,
+	scripts/gb_mandriva_MDKA_2007_030.nasl,
+	scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl,
+	scripts/sles11_mozilla-xulrunn.nasl,
+	scripts/gb_CESA-2010_0400_tetex_centos5_i386.nasl,
+	scripts/fcore_2009_5368.nasl,
+	scripts/gb_graphicsmagick_detect_win.nasl,
+	scripts/gb_solaris_109454_06.nasl,
+	scripts/glsa_200502_32.nasl,
+	scripts/gb_fedora_2008_6491_epiphany-extensions_fc8.nasl,
+	scripts/gb_CESA-2008_0223_seamonkey_centos3_i386.nasl,
+	scripts/gb_fedora_2008_0904_bind_fc7.nasl,
+	scripts/gb_fedora_2007_2697_galeon_fc7.nasl,
+	scripts/deb_779_2.nasl,
+	scripts/securecrt_remote_overflow.nasl,
+	scripts/gb_CESA-2009_0057_squirrelmail_centos4_i386.nasl,
+	scripts/gb_fedora_2011_8494_rubygem-activesupport_fc15.nasl,
+	scripts/sles9p5019072.nasl,
+	scripts/glsa_200812_15.nasl,
+	scripts/RHSA_2009_1504.nasl,
+	scripts/gb_ubuntu_USN_444_1.nasl,
+	scripts/sles10_websphere-as_ce.nasl,
+	scripts/gb_ubuntu_USN_454_1.nasl,
+	scripts/glsa_200605_06.nasl,
+	scripts/phpgroupware_message_script_inject.nasl,
+	scripts/gb_ubuntu_USN_612_11.nasl,
+	scripts/glsa_200512_02.nasl,
+	scripts/gb_hp_ux_HPSBUX00165.nasl,
+	scripts/RHSA_2009_0269.nasl,
+	scripts/ilohamail_arbitrary_file_access_via_lang.nasl,
+	scripts/sles10_kdegraphics3-pd0.nasl,
+	scripts/404_path_disclosure.nasl,
+	scripts/gb_mandriva_MDVA_2008_068.nasl,
+	scripts/suse_sa_2009_045.nasl,
+	scripts/gb_ubuntu_USN_1053_1.nasl,
+	scripts/glsa_200510_08.nasl,
+	scripts/simple_form_mail_relaying_via_subject_tags.nasl,
+	scripts/glsa_200408_14.nasl,
+	scripts/gb_mandriva_MDVSA_2011_112.nasl,
+	scripts/gb_suse_2008_056.nasl,
+	scripts/gb_mandriva_MDVSA_2010_180.nasl,
+	scripts/freebsd_apache12.nasl,
+	scripts/sles9p5019980.nasl,
+	scripts/gb_apache_49957.nasl,
+	scripts/gb_solaris_140102_01.nasl,
+	scripts/deb_768_1.nasl,
+	scripts/gb_fedora_2008_0506_tog-pegasus_fc7.nasl,
+	scripts/gb_ubuntu_USN_1180_1.nasl,
+	scripts/gb_CESA-2009_0411_device-mapper-multipath_centos4_i386.nasl,
+	scripts/gb_RHSA-2011_0305-01_samba.nasl,
+	scripts/gb_fedora_2008_8282_rubygems_fc8.nasl,
+	scripts/deb_1724_1.nasl,
+	scripts/gb_mandriva_MDKA_2007_092.nasl,
+	scripts/roxen_counter.nasl,
+	scripts/uebimiau_session_disclosure.nasl,
+	scripts/gb_fedora_2007_067_mono_fc6.nasl,
+	scripts/gb_ubuntu_USN_1108_2.nasl,
+	scripts/gb_mandriva_MDVSA_2010_162.nasl,
+	scripts/gb_CESA-2008_0058_libsmi_centos4_i386.nasl,
+	scripts/fortigate_detect.nasl,
+	scripts/gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl,
+	scripts/glsa_200601_01.nasl,
+	scripts/sles9p5024260.nasl,
+	scripts/fcore_2009_1525.nasl,
+	scripts/remote-detect-ApacheOfbiz.nasl,
+	scripts/glsa_200803_12.nasl,
+	scripts/freebsd_exim.nasl,
+	scripts/gb_ubuntu_USN_1222_2.nasl,
+	scripts/gb_mandriva_MDKSA_2007_136.nasl,
+	scripts/gb_fedora_2010_6077_kdebase_fc11.nasl,
+	scripts/gb_ubuntu_USN_1218_1.nasl,
+	scripts/deb_431_2.nasl,
+	scripts/freebsdsa_bind6.nasl,
+	scripts/secpod_pidgin_mult_dos_vuln_lin.nasl,
+	scripts/gb_fedora_2008_7463_wordpress_fc8.nasl,
+	scripts/gb_ubuntu_USN_483_1.nasl,
+	scripts/secpod_bloggeruniverse_sql_injection_vuln.nasl,
+	scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl,
+	scripts/deb_267_2.nasl,
+	scripts/interchange_detect.nasl,
+	scripts/gb_fedora_2008_6140_bluez-utils_fc8.nasl,
+	scripts/OpenX_37110.nasl,
+	scripts/freebsd_png4.nasl,
+	scripts/gb_fedora_2007_712_kernel_fc6.nasl,
+	scripts/glsa_200611_25.nasl,
+	scripts/RHSA_2009_1134.nasl,
+	scripts/freebsd_tiff5.nasl,
+	scripts/gb_hp_ux_HPSBUX00303.nasl,
+	scripts/freebsd_krb511.nasl,
+	scripts/awstats_detect.nasl,
+	scripts/gb_ubuntu_USN_631_1.nasl,
+	scripts/secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl,
+	scripts/glsa_200402_01.nasl,
+	scripts/gb_limny_detect.nasl,
+	scripts/gb_fedora_2010_2762_curl_fc12.nasl,
+	scripts/deb_1798_1.nasl,
+	scripts/gb_solaris_122092_01.nasl,
+	scripts/gb_fedora_2007_1099_gimp_fc7.nasl,
+	scripts/freebsd_linux-opera7.nasl,
+	scripts/glsa_200609_14.nasl,
+	scripts/gb_fedora_2011_6205_firefox_fc13.nasl,
+	scripts/gb_goldenftp_pass_cmd_bof_vuln.nasl,
+	scripts/support_incident_tracker_37949.nasl,
+	scripts/glsa_200405_25.nasl,
+	scripts/deb_2160_1.nasl,
+	scripts/glsa_200604_04.nasl,
+	scripts/gb_fedora_2008_11208_phpMyAdmin_fc9.nasl,
+	scripts/sles9p5020047.nasl,
+	scripts/gb_ubuntu_USN_1148_1.nasl,
+	scripts/secpod_nero_showtime_remote_bof_vuln_900410.nasl,
+	scripts/gb_fedora_2008_8069_ssmtp_fc9.nasl,
+	scripts/gb_fedora_2011_1958_q_fc13.nasl,
+	scripts/gb_mandriva_MDVA_2008_083.nasl,
+	scripts/gb_fedora_2010_8547_kdebase_fc11.nasl,
+	scripts/gb_fedora_2008_2370_roundup_fc7.nasl,
+	scripts/gb_mandriva_MDVA_2008_004.nasl,
+	scripts/secpod_euphonics_player_bof_vuln.nasl,
+	scripts/deb_1338_1.nasl,
+	scripts/gb_fedora_2011_0650_tor_fc13.nasl,
+	scripts/gb_vlc_media_player_intgr_bof_vuln_win.nasl,
+	scripts/freebsdsa_bind10.nasl,
+	scripts/gb_wordpress_mult_themes_xss_vuln.nasl,
+	scripts/gb_multicms_46062.nasl,
+	scripts/sles9p5062132.nasl,
+	scripts/gb_fedora_2008_3010_pdns-recursor_fc7.nasl,
+	scripts/gb_v-webmail_detect.nasl,
+	scripts/gb_fedora_2010_0601_php-ZendFramework_fc11.nasl,
+	scripts/freebsd_p5-File-Path.nasl,
+	scripts/phorum_35134.nasl,
+	scripts/glsa_200605_15.nasl,
+	scripts/gb_fedora_2007_737_xen_fc6.nasl,
+	scripts/gb_ideal_administrator_detect.nasl,
+	scripts/sles9p5012275.nasl,
+	scripts/smb_nt_ms03-009.nasl,
+	scripts/gb_mandriva_MDVSA_2008_137.nasl,
+	scripts/gb_ubuntu_USN_522_1.nasl,
+	scripts/gb_ubuntu_USN_537_2.nasl,
+	scripts/glsa_200907_06.nasl,
+	scripts/gb_RHSA-2010_0682-01_thunderbird.nasl,
+	scripts/cgiwebupdate.nasl,
+	scripts/ion_p.nasl,
+	scripts/glsa_200504_03.nasl,
+	scripts/deb_1037_1.nasl,
+	scripts/gb_mandriva_MDVA_2008_067.nasl,
+	scripts/gb_ubuntu_USN_662_1.nasl,
+	scripts/deb_1036_1.nasl,
+	scripts/glsa_200511_17.nasl,
+	scripts/gb_phorum_xss_n_csrf_vuln.nasl,
+	scripts/mdksa_2009_079.nasl,
+	scripts/gb_ubuntu_USN_640_1.nasl,
+	scripts/gb_RHSA-2011_0310-01_firefox.nasl,
+	scripts/linksys_ap_default_password.nasl,
+	scripts/mdksa_2009_284.nasl,
+	scripts/gb_fedora_2008_6127_liferea_fc8.nasl,
+	scripts/freebsd_imap-uw2.nasl,
+	scripts/gb_fedora_2007_3255_perl_fc7.nasl,
+	scripts/gb_simple_machines_forum_detect.nasl,
+	scripts/gb_ms_iis_ftpd_dos_vuln.nasl,
+	scripts/gb_solaris_114674_01.nasl,
+	scripts/sles11_ext4dev-kmp-def4.nasl,
+	scripts/glsa_200409_19.nasl,
+	scripts/gb_ubuntu_USN_1057_1.nasl,
+	scripts/deb_1492_1.nasl,
+	scripts/glsa_201012_01.nasl,
+	scripts/gb_hp_ux_HPSBUX02351.nasl,
+	scripts/gb_fedora_2008_2812_seamonkey_fc7.nasl,
+	scripts/freebsd_joomla1.nasl,
+	scripts/gb_hp_ux_HPSBUX02655.nasl,
+	scripts/deb_528_1.nasl,
+	scripts/gb_fedora_2010_3787_drupal_fc12.nasl,
+	scripts/secpod_asterisk_sip_channel_driver_dos_vuln.nasl,
+	scripts/deb_2204_1.nasl,
+	scripts/gb_fedora_2010_8273_texlive_fc11.nasl,
+	scripts/gb_adobe_flash_player_mult_vuln_win_may11.nasl,
+	scripts/secpod_ms10-071.nasl,
+	scripts/gb_mandriva_MDVSA_2010_097.nasl,
+	scripts/freebsd_pcre0.nasl,
+	scripts/gb_fedora_2007_2969_mono_fc8.nasl,
+	scripts/gb_sun_java_se_unspecified_vuln_aug09.nasl,
+	scripts/gb_ubuntu_USN_1244_1.nasl:
+	Updated script metadata (changes for CR56).
+
+2011-11-09  Henri Doreau <henri.doreau at greenbone.net>
+
 	* scripts/suse_sa_2009_050.nasl,
 	scripts/freebsd_isc-dhcp3-relay.nasl,
 	scripts/mambo_xss.nasl,

Modified: trunk/openvas-plugins/scripts/404_path_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/404_path_disclosure.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/404_path_disclosure.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -40,6 +40,8 @@
 {
  script_id(11714);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(3341, 4035, 4261, 5054, 8075);
  # Note: the way the test is made will lead to detecting some
  # path disclosure issues which might be checked by other plugins 
@@ -65,8 +67,7 @@
 Whilst printing errors to the output is useful for debugging applications, 
 this feature should not be enabled on production servers.
 
-Solution : Upgrade your server or reconfigure it
-Risk factor: Medium";
+Solution : Upgrade your server or reconfigure it";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/OpenX_37110.nasl
===================================================================
--- trunk/openvas-plugins/scripts/OpenX_37110.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/OpenX_37110.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(100364);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-25 11:49:08 +0100 (Wed, 25 Nov 2009)");
  script_tag(name:"cvss_base", value:"6.0");
  script_cve_id("CVE-2009-4098");
  script_bugtraq_id(37110);
@@ -54,10 +56,8 @@
 References:
 http://www.securityfocus.com/bid/37110
 http://www.openx.org/
-http://www.securityfocus.com/archive/1/508050
+http://www.securityfocus.com/archive/1/508050";
 
-Risk factor: High";
-
  script_description(desc);
  script_summary("Determine the OpenX version.");
  script_category(ACT_GATHER_INFO);

Modified: trunk/openvas-plugins/scripts/RHSA_2009_0269.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0269.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0269.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(63319);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-10 15:52:40 +0100 (Tue, 10 Feb 2009)");
  script_cve_id("CVE-2009-0398");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -58,10 +60,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-0269.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:0269";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1134.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1134.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1134.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(64334);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-06 20:36:15 +0200 (Mon, 06 Jul 2009)");
  script_cve_id("CVE-2009-2210");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -56,10 +58,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1134.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Redhat Security Advisory RHSA-2009:1134";

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1185.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1185.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1185.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(64509);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
  script_cve_id("CVE-2009-2404");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -63,10 +65,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1185.html
-http://www.redhat.com/security/updates/classification/#critical
+http://www.redhat.com/security/updates/classification/#critical";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1185");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1432.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(64834);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-15 22:46:32 +0200 (Tue, 15 Sep 2009)");
  script_cve_id("CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2654", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -86,10 +88,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1432.html
-http://www.redhat.com/security/updates/classification/#critical
+http://www.redhat.com/security/updates/classification/#critical";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1432");

Modified: trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(66016);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)");
  script_cve_id("CVE-2009-3603", "CVE-2009-3608", "CVE-2009-3609");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -61,10 +63,8 @@
 Hat Update Agent with the following command: up2date
 
 http://rhn.redhat.com/errata/RHSA-2009-1504.html
-http://www.redhat.com/security/updates/classification/#important
+http://www.redhat.com/security/updates/classification/#important";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Redhat Security Advisory RHSA-2009:1504");

Modified: trunk/openvas-plugins/scripts/awstats_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/awstats_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/awstats_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -31,14 +31,14 @@
 graphically.
 
 See also:
-http://awstats.sourceforge.net/
+http://awstats.sourceforge.net/";
 
-Risk factor : None";
-
 if (description)
 {
  script_id(100376);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-03 12:57:42 +0100 (Thu, 03 Dec 2009)");
  script_tag(name:"risk_factor", value:"None");
 
  script_name("AWStats Detection");

Modified: trunk/openvas-plugins/scripts/cgiwebupdate.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cgiwebupdate.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/cgiwebupdate.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(11722);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(3216);
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -46,12 +48,9 @@
 Solution : remove it from the cgi-bin or scripts folder.
 
 *** As OpenVAS solely relied on the existence of the cgiWebupdate.exe file, 
-*** this might be a false positive
+*** this might be a false positive";
 
 
-Risk factor: Medium";
-
-
  script_description(desc);
  
  summary = "Checks for the cgiWebupdate.exe file";

Modified: trunk/openvas-plugins/scripts/cyrus_imsp_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cyrus_imsp_overflow.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/cyrus_imsp_overflow.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -33,6 +33,8 @@
 {
  script_id(11953);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"High");
  
  name = "cyrus-imsp abook_dbname buffer overflow";

Modified: trunk/openvas-plugins/scripts/deb_1034_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1034_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1034_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(56581);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-1260", "CVE-2006-1491");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -63,10 +65,8 @@
 We recommend that you upgrade your horde2 package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201034-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201034-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1034-1 (horde2)";

Modified: trunk/openvas-plugins/scripts/deb_1036_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1036_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1036_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(56583);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(17401);
  script_cve_id("CVE-2006-1744");
  script_tag(name:"cvss_base", value:"4.6");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your bsdgames package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201036-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201036-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1036-1 (bsdgames)";

Modified: trunk/openvas-plugins/scripts/deb_1037_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1037_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1037_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(56625);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(17409);
  script_cve_id("CVE-2006-1060");
  script_tag(name:"cvss_base", value:"7.5");
@@ -53,10 +55,8 @@
 We recommend that you upgrade your zgv package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201037-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201037-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1037-1 (zgv)";

Modified: trunk/openvas-plugins/scripts/deb_1045_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1045_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1045_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(56666);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-1629");
  script_bugtraq_id(17392);
  script_tag(name:"cvss_base", value:"9.0");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your openvpn package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201045-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201045-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1045-1 (openvpn)";

Modified: trunk/openvas-plugins/scripts/deb_1215_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1215_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1215_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(57590);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:17:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-4799", "CVE-2006-4800");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -62,10 +64,8 @@
 We recommend that you upgrade your xine-lib packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201215-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201215-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1215-1 (xine-lib)";

Modified: trunk/openvas-plugins/scripts/deb_121_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_121_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_121_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53397);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "Debian Security Advisory DSA 121-1 (xtell)";
  script_name(name);
@@ -52,10 +54,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20121-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20121-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 121-1 (xtell)";

Modified: trunk/openvas-plugins/scripts/deb_1282_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1282_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1282_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(58334);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:17:11 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-1286", "CVE-2007-1380", "CVE-2007-1521", "CVE-2007-1711", "CVE-2007-1718", "CVE-2007-1777");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -84,10 +86,8 @@
 We recommend that you upgrade your PHP packages. Packages for the arm,
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201282-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201282-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1282-1 (php4)";

Modified: trunk/openvas-plugins/scripts/deb_1338_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1338_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1338_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(58470);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2007-3089", "CVE-2007-3656", "CVE-2007-3734", "CVE-2007-3735", "CVE-2007-3736", "CVE-2007-3737", "CVE-2007-3738");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
@@ -91,10 +93,8 @@
 We recommend that you upgrade your iceweasel packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201338-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201338-1";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1338-1 (iceweasel)";

Modified: trunk/openvas-plugins/scripts/deb_1478_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1478_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1478_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(60271);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-31 19:16:52 +0100 (Thu, 31 Jan 2008)");
  script_cve_id("CVE-2008-0226", "CVE-2008-0227");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your mysql-dfsg-5.0 package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201478-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201478-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1478-1 (mysql-dfsg-5.0)";

Modified: trunk/openvas-plugins/scripts/deb_1492_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1492_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1492_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(60365);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-02-15 23:29:21 +0100 (Fri, 15 Feb 2008)");
  script_cve_id("CVE-2008-0665", "CVE-2008-0666");
  script_tag(name:"cvss_base", value:"3.6");
  script_tag(name:"risk_factor", value:"Medium");
@@ -50,10 +52,8 @@
 We recommend that you upgrade your wml packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201492-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201492-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1492-1 (wml)";

Modified: trunk/openvas-plugins/scripts/deb_1523_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1523_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1523_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(60577);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-03-19 20:30:32 +0100 (Wed, 19 Mar 2008)");
  script_cve_id("CVE-2008-0808", "CVE-2008-0809");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your ikiwiki package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201523-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201523-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1523-1 (ikiwiki)";

Modified: trunk/openvas-plugins/scripts/deb_1545_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1545_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1545_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(60791);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-04-21 20:40:14 +0200 (Mon, 21 Apr 2008)");
  script_cve_id("CVE-2008-1720");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -49,10 +51,8 @@
 We recommend that you upgrade your rsync package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201545-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201545-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1545-1 (rsync)";

Modified: trunk/openvas-plugins/scripts/deb_1622_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1622_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1622_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(61374);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-08-15 15:52:52 +0200 (Fri, 15 Aug 2008)");
  script_cve_id("CVE-2008-3252");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -50,10 +52,8 @@
 We recommend that you upgrade your newsx package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201622-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201622-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1622-1 (newsx)";

Modified: trunk/openvas-plugins/scripts/deb_1650_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1650_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1650_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(61772);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-11-01 01:55:10 +0100 (Sat, 01 Nov 2008)");
  script_cve_id("CVE-2008-2952");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -50,10 +52,8 @@
 We recommend that you upgrade your openldap2.3 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201650-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201650-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1650-1 (openldap2.3)";

Modified: trunk/openvas-plugins/scripts/deb_1679_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1679_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1679_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,6 +28,8 @@
 {
  script_id(62841);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-12-10 05:23:56 +0100 (Wed, 10 Dec 2008)");
  script_cve_id("CVE-2008-3714");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -49,10 +51,8 @@
 We recommend that you upgrade your awstats package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201679-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201679-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1679-1 (awstats)";

Modified: trunk/openvas-plugins/scripts/deb_1724_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1724_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1724_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(63410);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-18 23:13:28 +0100 (Wed, 18 Feb 2009)");
  script_cve_id("CVE-2009-0500", "CVE-2009-0502", "CVE-2008-5153");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"risk_factor", value:"High");
@@ -72,10 +74,8 @@
 We recommend that you upgrade your moodle package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201724-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201724-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1724-1 (moodle)";

Modified: trunk/openvas-plugins/scripts/deb_1798_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1798_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_1798_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(63963);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-11 20:24:31 +0200 (Mon, 11 May 2009)");
  script_cve_id("CVE-2009-1194");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -58,10 +60,8 @@
 We recommend that you upgrade your pango1.0 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201798-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201798-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 1798-1 (pango1.0)";

Modified: trunk/openvas-plugins/scripts/deb_191_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_191_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_191_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53736);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2002-1131", "CVE-2002-1132");
  script_bugtraq_id(5949);
  script_tag(name:"cvss_base", value:"7.5");
@@ -63,10 +65,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20191-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20191-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 191-1 (squirrelmail)";

Modified: trunk/openvas-plugins/scripts/deb_2022_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2022_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_2022_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(67126);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-03-30 18:37:46 +0200 (Tue, 30 Mar 2010)");
  script_tag(name:"risk_factor", value:"High");
  script_name("Debian Security Advisory DSA 2022-1 (mediawiki)");
 
@@ -59,10 +61,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202022-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202022-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2022-1 (mediawiki)");

Modified: trunk/openvas-plugins/scripts/deb_2155_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2155_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_2155_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(68991);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-07 16:04:02 +0100 (Mon, 07 Mar 2011)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2010-3814", "CVE-2010-3855");
  script_tag(name:"risk_factor", value:"High");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your freetype packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202155-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202155-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2155-1 (freetype)");

Modified: trunk/openvas-plugins/scripts/deb_2160_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2160_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_2160_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(68994);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-07 16:04:02 +0100 (Mon, 07 Mar 2011)");
  script_tag(name:"cvss_base", value:"5.0");
  script_cve_id("CVE-2010-3718", "CVE-2011-0013", "CVE-2011-0534");
  script_tag(name:"risk_factor", value:"Medium");
@@ -67,10 +69,8 @@
 We recommend that you upgrade your tomcat6 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202160-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202160-1";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2160-1 (tomcat6)");

Modified: trunk/openvas-plugins/scripts/deb_2204_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2204_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_2204_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(69340);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)");
  script_tag(name:"cvss_base", value:"4.3");
   script_cve_id("CVE-2010-3695");
  script_tag(name:"risk_factor", value:"Medium");
@@ -57,10 +59,8 @@
 We recommend that you upgrade your imp4 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202204-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202204-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2204-1 (imp4)");

Modified: trunk/openvas-plugins/scripts/deb_2213_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2213_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_2213_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(69557);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)");
  script_tag(name:"cvss_base", value:"9.3");
   script_cve_id("CVE-2011-0465");
  script_tag(name:"risk_factor", value:"Critical");
@@ -59,10 +61,8 @@
 We recommend that you upgrade your x11-xserver-utils packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202213-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202213-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("Debian Security Advisory DSA 2213-1 (x11-xserver-utils)");

Modified: trunk/openvas-plugins/scripts/deb_241_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_241_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_241_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53319);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(6462);
  script_cve_id("CVE-2002-1393");
  script_tag(name:"cvss_base", value:"7.5");
@@ -65,10 +67,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20241-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20241-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 241-1 (kdeutils)";

Modified: trunk/openvas-plugins/scripts/deb_245_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_245_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_245_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53321);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(6628);
  script_cve_id("CVE-2003-0039");
  script_tag(name:"cvss_base", value:"5.0");
@@ -70,10 +72,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20245-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20245-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 245-1 (dhcp3)";

Modified: trunk/openvas-plugins/scripts/deb_267_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_267_2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_267_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53358);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(7025);
  script_cve_id("CVE-2003-0144");
  script_tag(name:"cvss_base", value:"7.2");
@@ -59,10 +61,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20267-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20267-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 267-2 (lpr)";

Modified: trunk/openvas-plugins/scripts/deb_431_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_431_2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_431_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53180);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
  script_bugtraq_id(9543);
  script_cve_id("CVE-2003-0618");
  script_tag(name:"cvss_base", value:"2.1");
@@ -58,10 +60,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20431-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20431-2";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 431-2 (perl)";

Modified: trunk/openvas-plugins/scripts/deb_528_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_528_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_528_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53219);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0635");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -54,10 +56,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20528-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20528-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 528-1 (ethereal)";

Modified: trunk/openvas-plugins/scripts/deb_536_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_536_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_536_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53226);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0597", "CVE-2004-0598", "CVE-2004-0599", "CVE-2004-0768", "CVE-2002-1363");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
@@ -69,10 +71,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20536-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20536-1";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 536-1 (libpng)";

Modified: trunk/openvas-plugins/scripts/deb_671_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_671_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_671_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(53500);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-0100");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -51,10 +53,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20671-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20671-1";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 671-1 (xemacs21)";

Modified: trunk/openvas-plugins/scripts/deb_768_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_768_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_768_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(54442);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-2161");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your phpbb2 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20768-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20768-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 768-1 (phpbb2)";

Modified: trunk/openvas-plugins/scripts/deb_779_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_779_2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_779_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(55205);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-2260", "CVE-2005-2261", "CVE-2005-2262", "CVE-2005-2263", "CVE-2005-2264", "CVE-2005-2265", "CVE-2005-2266", "CVE-2005-2267", "CVE-2005-2268", "CVE-2005-2269", "CVE-2005-2270");
  script_bugtraq_id(14242);
  script_tag(name:"cvss_base", value:"7.5");
@@ -117,10 +119,8 @@
 
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20779-2
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20779-2";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 779-2 (mozilla-firefox)";

Modified: trunk/openvas-plugins/scripts/deb_833_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_833_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_833_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(55514);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2005-2558");
  script_bugtraq_id(14509);
  script_tag(name:"cvss_base", value:"4.6");
@@ -55,10 +57,8 @@
 We recommend that you upgrade your mysql-dfsg-4.1 packages.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20833-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20833-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 833-1 (mysql-dfsg-4.1)";

Modified: trunk/openvas-plugins/scripts/deb_963_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_963_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/deb_963_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
  script_id(56241);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2006-0351");
  script_bugtraq_id(16431);
  script_tag(name:"cvss_base", value:"5.0");
@@ -52,10 +54,8 @@
 We recommend that you upgrade your mydns package.
 
 Solution:
-https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20963-1
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20963-1";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Debian Security Advisory DSA 963-1 (mydns)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_12444.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12444.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/fcore_2009_12444.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(66432);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-10 00:23:54 +0100 (Thu, 10 Dec 2009)");
  script_cve_id("CVE-2008-3714");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -55,10 +57,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12444
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12444";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Fedora Core 10 FEDORA-2009-12444 (awstats)");

Modified: trunk/openvas-plugins/scripts/fcore_2009_1525.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1525.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/fcore_2009_1525.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(63380);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-13 20:43:17 +0100 (Fri, 13 Feb 2009)");
  script_cve_id("CVE-2008-5240");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -82,10 +84,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1525
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1525";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-1525 (xine-lib)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_1914.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_1914.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/fcore_2009_1914.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(63427);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-23 21:31:14 +0100 (Mon, 23 Feb 2009)");
  script_cve_id("CVE-2009-0129");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -65,10 +67,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1914
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-1914";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 9 FEDORA-2009-1914 (perl-Crypt-OpenSSL-DSA)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_3410.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3410.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/fcore_2009_3410.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(63774);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)");
  script_cve_id("CVE-2009-1213");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -67,10 +69,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3410
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3410";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-3410 (bugzilla)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_5368.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5368.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/fcore_2009_5368.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(64237);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-23 15:49:15 +0200 (Tue, 23 Jun 2009)");
  script_cve_id("CVE-2009-1753");
  script_tag(name:"cvss_base", value:"3.3");
  script_tag(name:"risk_factor", value:"Medium");
@@ -54,10 +56,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5368
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5368";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-5368 (coccinelle)";

Modified: trunk/openvas-plugins/scripts/fcore_2009_5969.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_5969.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/fcore_2009_5969.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(64298);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-30 00:29:55 +0200 (Tue, 30 Jun 2009)");
  script_cve_id("CVE-2009-0023", "CVE-2009-1955", "CVE-2009-1956");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
@@ -72,10 +74,8 @@
 For more information, refer to Managing Software with yum,
 available at http://docs.fedoraproject.org/yum/.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5969
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-5969";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Fedora Core 10 FEDORA-2009-5969 (apr-util)";

Modified: trunk/openvas-plugins/scripts/fortigate_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fortigate_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/fortigate_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,6 +26,8 @@
 {
  script_id(17367);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"None");
  
  name = "Fortinet Fortigate console management detection";
@@ -42,8 +44,7 @@
 to this, an attacker may set up a brute force attack against the remote
 interface.
 
-Solution : Filter incoming traffic to this port
-Risk factor : None";
+Solution : Filter incoming traffic to this port";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/freebsd_apache12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apache12.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_apache12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(58804);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-3847", "CVE-2007-1863", "CVE-2006-5752", "CVE-2007-3304");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -44,11 +46,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: apache";

Modified: trunk/openvas-plugins/scripts/freebsd_courier-imap.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_courier-imap.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_courier-imap.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(52418);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0777");
  script_bugtraq_id(10976);
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 
 http://www.idefense.com/application/poi/display?id=131&type=vulnerabilities&flashstatus=false
 http://lists.netsys.com/pipermail/full-disclosure/2004-August/025478.html
-http://www.vuxml.org/freebsd/616cf823-f48b-11d8-9837-000c41e2cdad.html
+http://www.vuxml.org/freebsd/616cf823-f48b-11d8-9837-000c41e2cdad.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: courier-imap";

Modified: trunk/openvas-plugins/scripts/freebsd_exim.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_exim.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_exim.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(52252);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-0021", "CVE-2005-0022");
  script_bugtraq_id(12185,12188,12268);
  script_tag(name:"cvss_base", value:"7.2");
@@ -67,10 +69,8 @@
 
 http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html
 http://marc.theaimsgroup.com/?l=bugtraq&m=110573573800377
-http://www.vuxml.org/freebsd/ca9ce879-5ebb-11d9-a01c-0050569f0001.html
+http://www.vuxml.org/freebsd/ca9ce879-5ebb-11d9-a01c-0050569f0001.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "exim -- two buffer overflow vulnerabilities";

Modified: trunk/openvas-plugins/scripts/freebsd_gallery20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gallery20.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_gallery20.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(58766);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-4650");
  script_bugtraq_id(25580);
  script_tag(name:"cvss_base", value:"6.4");
@@ -45,11 +47,8 @@
 
 Solution:
 Update your system with the appropriate patches or
-software upgrades.
+software upgrades.";
 
-
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: gallery2";

Modified: trunk/openvas-plugins/scripts/freebsd_gedit.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gedit.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_gedit.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(56315);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2005-1686");
  script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"risk_factor", value:"Medium");
@@ -54,10 +56,8 @@
 software upgrades.
 
 :http://marc.theaimsgroup.com/?l=bugtraq&m=111661117701398
-http://www.vuxml.org/freebsd/e319da0b-a228-11da-b410-000e0c2e438a.html
+http://www.vuxml.org/freebsd/e319da0b-a228-11da-b410-000e0c2e438a.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: gedit";

Modified: trunk/openvas-plugins/scripts/freebsd_imap-uw2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_imap-uw2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_imap-uw2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(63173);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-13 22:38:32 +0100 (Tue, 13 Jan 2009)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: imap-uw";
  script_name(name);
@@ -45,10 +47,8 @@
 
 http://www.washington.edu/imap/documentation/RELNOTES.html
 http://www.sans.org/newsletters/risk/display.php?v=7&i=45#08.45.22
-http://www.vuxml.org/freebsd/a6713190-dfea-11dd-a765-0030843d3802.html
+http://www.vuxml.org/freebsd/a6713190-dfea-11dd-a765-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: imap-uw";

Modified: trunk/openvas-plugins/scripts/freebsd_joomla1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_joomla1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_joomla1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(57805);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-6832", "CVE-2006-6833", "CVE-2006-6834");
  script_bugtraq_id(21810);
  script_tag(name:"cvss_base", value:"7.5");
@@ -46,10 +48,8 @@
 software upgrades.
 
 http://secunia.com/advisories/23563/
-http://www.vuxml.org/freebsd/7bb127c1-a5aa-11db-9ddc-0011098b2f36.html
+http://www.vuxml.org/freebsd/7bb127c1-a5aa-11db-9ddc-0011098b2f36.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: joomla";

Modified: trunk/openvas-plugins/scripts/freebsd_krb511.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_krb511.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_krb511.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(69596);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)");
  script_tag(name:"cvss_base", value:"7.6");
  script_cve_id("CVE-2011-0284");
  script_tag(name:"risk_factor", value:"High");
@@ -53,10 +55,8 @@
 software upgrades.
 
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
-http://www.vuxml.org/freebsd/7edac52a-66cd-11e0-9398-5d45f3aa24f0.html
+http://www.vuxml.org/freebsd/7edac52a-66cd-11e0-9398-5d45f3aa24f0.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: krb5");

Modified: trunk/openvas-plugins/scripts/freebsd_linux-opera7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-opera7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_linux-opera7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(57000);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2006-3198");
  script_bugtraq_id(18594);
@@ -50,10 +52,8 @@
 
 http://secunia.com/advisories/20787/
 http://marc.theaimsgroup.com/?l=bugtraq&m=115100029717146
-http://www.vuxml.org/freebsd/0a4cd819-0291-11db-bbf7-000c6ec775d9.html
+http://www.vuxml.org/freebsd/0a4cd819-0291-11db-bbf7-000c6ec775d9.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: linux-opera, opera-devel, opera";

Modified: trunk/openvas-plugins/scripts/freebsd_mod_security.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mod_security.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_mod_security.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(52448);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(9885);
  script_cve_id("CVE-2004-1765");
  script_tag(name:"cvss_base", value:"7.5");
@@ -52,10 +54,8 @@
 
 http://www.s-quadra.com/advisories/Adv-20040315.txt
 http://secunia.com/advisories/11138
-http://www.vuxml.org/freebsd/c2e10368-77ab-11d8-b9e8-00e04ccb0a62.html
+http://www.vuxml.org/freebsd/c2e10368-77ab-11d8-b9e8-00e04ccb0a62.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: mod_security";

Modified: trunk/openvas-plugins/scripts/freebsd_opera14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_opera14.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_opera14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(61880);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-11-19 16:52:57 +0100 (Wed, 19 Nov 2008)");
  script_tag(name:"risk_factor", value:"High");
  name = "FreeBSD Ports: opera, linux-opera";
  script_name(name);
@@ -47,10 +49,8 @@
 
 http://www.opera.com/support/search/view/906/
 http://www.opera.com/support/search/view/907/
-http://www.vuxml.org/freebsd/0e30e802-a9db-11dd-93a2-000bcdf0a03b.html
+http://www.vuxml.org/freebsd/0e30e802-a9db-11dd-93a2-000bcdf0a03b.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: opera, linux-opera";

Modified: trunk/openvas-plugins/scripts/freebsd_p5-File-Path.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_p5-File-Path.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_p5-File-Path.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(63107);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-07 23:16:01 +0100 (Wed, 07 Jan 2009)");
  script_cve_id("CVE-2005-0448");
  script_tag(name:"cvss_base", value:"1.2");
  script_tag(name:"risk_factor", value:"Low");
@@ -53,10 +55,8 @@
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905
 http://www.openwall.com/lists/oss-security/2008/11/28/1
 http://www.gossamer-threads.com/lists/perl/porters/233699#233699
-http://www.vuxml.org/freebsd/13b0c8c8-bee0-11dd-a708-001fc66e7203.html
+http://www.vuxml.org/freebsd/13b0c8c8-bee0-11dd-a708-001fc66e7203.html";
 
-Risk factor: Low";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: p5-File-Path";

Modified: trunk/openvas-plugins/scripts/freebsd_pcre0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_pcre0.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_pcre0.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(58770);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-1659", "CVE-2007-1660", "CVE-2007-1661", "CVE-2007-1662", "CVE-2007-4766", "CVE-2007-4767", "CVE-2007-4768");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
@@ -49,10 +51,8 @@
 software upgrades.
 
 http://www.pcre.org/changelog.txt
-http://www.vuxml.org/freebsd/bfd6eef4-8c94-11dc-8c55-001c2514716c.html
+http://www.vuxml.org/freebsd/bfd6eef4-8c94-11dc-8c55-001c2514716c.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: pcre, pcre-utf8";

Modified: trunk/openvas-plugins/scripts/freebsd_png4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_png4.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_png4.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(67649);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-06 02:35:12 +0200 (Tue, 06 Jul 2010)");
  script_tag(name:"cvss_base", value:"7.5");
  script_cve_id("CVE-2010-1205");
  script_bugtraq_id(41174);
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://www.libpng.org/pub/png/libpng.html
-http://www.vuxml.org/freebsd/edef3f2f-82cf-11df-bcce-0018f3e2eb82.html
+http://www.vuxml.org/freebsd/edef3f2f-82cf-11df-bcce-0018f3e2eb82.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: png");

Modified: trunk/openvas-plugins/scripts/freebsd_ruby2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ruby2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_ruby2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(55744);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(17951, 14909);
  script_cve_id("CVE-2005-2337");
  script_tag(name:"cvss_base", value:"7.5");
@@ -54,10 +56,8 @@
 software upgrades.
 
 http://www.ruby-lang.org/en/20051003.html
-http://www.vuxml.org/freebsd/1daea60a-4719-11da-b5c6-0004614cc33d.html
+http://www.vuxml.org/freebsd/1daea60a-4719-11da-b5c6-0004614cc33d.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: ruby, ruby_static";

Modified: trunk/openvas-plugins/scripts/freebsd_tcpdump.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tcpdump.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_tcpdump.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(52483);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2004-0183", "CVE-2004-0184");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -62,10 +64,8 @@
 
 http://www.rapid7.com/advisories/R7-0017.html
 http://marc.theaimsgroup.com/?l=bugtraq&m=108067265931525
-http://www.vuxml.org/freebsd/f8551668-de09-4d7b-9720-f1360929df07.html
+http://www.vuxml.org/freebsd/f8551668-de09-4d7b-9720-f1360929df07.html";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: tcpdump";

Modified: trunk/openvas-plugins/scripts/freebsd_tiff5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tiff5.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_tiff5.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(67655);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-06 02:35:12 +0200 (Tue, 06 Jul 2010)");
  script_tag(name:"cvss_base", value:"9.3");
  script_cve_id("CVE-2009-2347");
  script_tag(name:"risk_factor", value:"Critical");
@@ -56,10 +58,8 @@
 
 http://www.remotesensing.org/libtiff/v3.9.4.html
 http://www.ocert.org/advisories/ocert-2009-012.html
-http://www.vuxml.org/freebsd/8816bf3a-7929-11df-bcce-0018f3e2eb82.html
+http://www.vuxml.org/freebsd/8816bf3a-7929-11df-bcce-0018f3e2eb82.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: tiff");

Modified: trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_webkit-gtk2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(67711);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-07-22 17:43:43 +0200 (Thu, 22 Jul 2010)");
  script_tag(name:"cvss_base", value:"10.0");
  script_cve_id("CVE-2010-1407", "CVE-2010-1405", "CVE-2010-1664", "CVE-2010-1762", "CVE-2010-1760", "CVE-2010-1761", "CVE-2010-1767", "CVE-2010-1771", "CVE-2010-1421", "CVE-2010-1386", "CVE-2010-1422", "CVE-2010-1416", "CVE-2010-1417", "CVE-2010-1418", "CVE-2010-1770", "CVE-2010-1773", "CVE-2010-1772", "CVE-2010-1774", "CVE-2010-1759", "CVE-2010-1758", "CVE-2010-1665", "CVE-2010-1392");
  script_tag(name:"risk_factor", value:"Critical");
@@ -45,10 +47,8 @@
 software upgrades.
 
 http://blog.kov.eti.br/?p=116
-http://www.vuxml.org/freebsd/19419b3b-92bd-11df-b140-0015f2db7bde.html
+http://www.vuxml.org/freebsd/19419b3b-92bd-11df-b140-0015f2db7bde.html";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("FreeBSD Ports: webkit-gtk2");

Modified: trunk/openvas-plugins/scripts/freebsd_websvn.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_websvn.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_websvn.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(63358);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-02-13 20:43:17 +0100 (Fri, 13 Feb 2009)");
  script_cve_id("CVE-2008-5918", "CVE-2008-5919", "CVE-2009-0240");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
@@ -65,10 +67,8 @@
 http://secunia.com/advisories/32338/
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191
 http://www.gulftech.org/?node=research&article_id=00132-10202008
-http://www.vuxml.org/freebsd/71597e3e-f6b8-11dd-94d9-0030843d3802.html
+http://www.vuxml.org/freebsd/71597e3e-f6b8-11dd-94d9-0030843d3802.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: websvn";

Modified: trunk/openvas-plugins/scripts/freebsd_zoo.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_zoo.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsd_zoo.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,6 +29,8 @@
 {
  script_id(56518);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2006-0855");
  script_bugtraq_id(16790);
  script_tag(name:"cvss_base", value:"5.1");
@@ -52,10 +54,8 @@
 software upgrades.
 
 http://www.guay-leroux.com/projects/zoo-advisory.txt
-http://www.vuxml.org/freebsd/d9307a41-c4d7-11da-b2fb-000e0c2e438a.html
+http://www.vuxml.org/freebsd/d9307a41-c4d7-11da-b2fb-000e0c2e438a.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "FreeBSD Ports: zoo";

Modified: trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsdsa_bind10.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(69771);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-08-03 04:36:20 +0200 (Wed, 03 Aug 2011)");
  script_cve_id("CVE-2011-1910");
  script_tag(name:"cvss_base", value:"5.0");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-11:02.bind.asc)");
@@ -52,8 +54,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-11:02.bind.asc
-Risk factor : Medium";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-11:02.bind.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_bind6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_bind6.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsdsa_bind6.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,6 +30,8 @@
 {
  script_id(63243);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)");
  script_cve_id("CVE-2009-0025");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
@@ -60,8 +62,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-09:04.bind.asc
-Risk factor: Medium";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-09:04.bind.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/freebsdsa_ipfw1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsdsa_ipfw1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/freebsdsa_ipfw1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -31,6 +31,8 @@
 {
  script_id(56109);
  script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_bugtraq_id(16209);
  script_cve_id("CVE-2006-0054");
  script_tag(name:"cvss_base", value:"5.0");
@@ -56,8 +58,7 @@
 Upgrade your system to the appropriate stable release
 or security branch dated after the correction date
 
-https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:04.ipfw.asc
-Risk factor: Medium";
+https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:04.ipfw.asc";
 
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0058_libsmi_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0058_libsmi_centos4_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0058_libsmi_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880208);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0058");
@@ -62,10 +64,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-January/014652.html
+  http://lists.centos.org/pipermail/centos-announce/2008-January/014652.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of libsmi");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0058_libsmi_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0177_evolution_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0177_evolution_centos4_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0177_evolution_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880101);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 08:36:45 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2008:0177");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-March/014750.html
+  http://lists.centos.org/pipermail/centos-announce/2008-March/014750.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of evolution");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0177_evolution_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2008_0223_seamonkey_centos3_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2008_0223_seamonkey_centos3_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2008_0223_seamonkey_centos3_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880225);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2008:0223");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.centos.org/pipermail/centos-announce/2008-April/014822.html
+  http://lists.centos.org/pipermail/centos-announce/2008-April/014822.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2008_0223_seamonkey_centos3_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0057_squirrelmail_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0057_squirrelmail_centos4_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0057_squirrelmail_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880925);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"6.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:0057");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0057_squirrelmail_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2009_0411_device-mapper-multipath_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2009_0411_device-mapper-multipath_centos4_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2009_0411_device-mapper-multipath_centos4_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880914);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2009:0411");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2009_0411_device-mapper-multipath_centos4_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos5_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos5_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880622);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0360");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0360_wireshark_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0400_tetex_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0400_tetex_centos5_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0400_tetex_centos5_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880598);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "CESA", value: "2010:0400");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0400_tetex_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_CESA-2010_0603_gnupg2_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2010_0603_gnupg2_centos5_i386.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_CESA-2010_0603_gnupg2_centos5_i386.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(880591);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
   script_tag(name:"cvss_base", value:"5.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "CESA", value: "2010:0603");


Property changes on: trunk/openvas-plugins/scripts/gb_CESA-2010_0603_gnupg2_centos5_i386.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0682-01_thunderbird.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0682-01_thunderbird.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0682-01_thunderbird.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870319);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 14:21:00 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2010:0682-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0682-01_thunderbird.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2010_0976-01_bind.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2010_0976-01_bind.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2010_0976-01_bind.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870371);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-28 07:11:56 +0100 (Tue, 28 Dec 2010)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "RHSA", value: "2010:0976-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2010_0976-01_bind.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_0305-01_samba.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_0305-01_samba.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_0305-01_samba.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870399);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "RHSA", value: "2011:0305-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_0305-01_samba.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_RHSA-2011_0310-01_firefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_0310-01_firefox.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_0310-01_firefox.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(870403);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "RHSA", value: "2011:0310-01");


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_0310-01_firefox.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_win_may11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_win_may11.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_win_may11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_adobe_flash_player_mult_vuln_win_may11.nasl 15299 2011-05-17 12:32:12Z may $
+# $Id$
 #
 # Adobe Flash Player Multiple Vulnerabilities May-2011 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801792);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-23 15:31:07 +0200 (Mon, 23 May 2011)");
   script_cve_id("CVE-2011-0579", "CVE-2011-0618", "CVE-2011-0619", "CVE-2011-0620",
                 "CVE-2011-0621", "CVE-2011-0622", "CVE-2011-0623", "CVE-2011-0624",
                 "CVE-2011-0625", "CVE-2011-0626", "CVE-2011-0627");


Property changes on: trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_win_may11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apache_49957.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apache_49957.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_apache_49957.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,11 +27,13 @@
 if (description)
 {
  script_id(103293);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-10-11 17:46:33 +0200 (Tue, 11 Oct 2011)");
  script_bugtraq_id(49957);
  script_cve_id("CVE-2011-3368");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
- script_version ("$Revision$");
 
  script_name("Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_apache_49957.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_apple_safari_mult_vuln_jun10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apple_safari_mult_vuln_jun10.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_apple_safari_mult_vuln_jun10.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_apple_safari_mult_vuln_jun10.nasl 9590 2010-10-14 11:20:26Z jun $
+# $Id$
 #
 # Apple Safari Multiple Vulnerabilities (June-10)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801362);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-16 08:26:33 +0200 (Wed, 16 Jun 2010)");
   script_cve_id("CVE-2010-1385", "CVE-2010-1384", "CVE-2010-1390", "CVE-2010-1389",
                 "CVE-2010-1391", "CVE-2010-1393", "CVE-2010-1392", "CVE-2010-1394",
                 "CVE-2010-1395", "CVE-2010-1396", "CVE-2010-1398", "CVE-2010-1397",


Property changes on: trunk/openvas-plugins/scripts/gb_apple_safari_mult_vuln_jun10.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ccproxy_connection_req_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ccproxy_connection_req_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ccproxy_connection_req_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ccproxy_connection_req_bof_vuln.nasl 831 2009-03-13 14:45:02Z mar $
+# $Id$
 #
 # CCProxy CONNECTION Request Buffer Overflow Vulnerability.
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800539);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-16 10:38:04 +0100 (Mon, 16 Mar 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-6415");
@@ -58,8 +60,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.4
-  Risk factor: Critical ";
+    CVSS Temporal Score : 7.4";
 
   script_description(desc);
   script_summary("Check for the version of CCProxy");


Property changes on: trunk/openvas-plugins/scripts/gb_ccproxy_connection_req_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_clanlite_sql_inj_n_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_clanlite_sql_inj_n_xss_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_clanlite_sql_inj_n_xss_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_clanlite_sql_inj_n_xss_vuln.nasl 529 2008-11-27 15:11:27Z nov $
+# $Id$
 #
 # ClanLite SQL Injection and Cross-Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800145);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-01 15:31:19 +0100 (Mon, 01 Dec 2008)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2008-5214", "CVE-2008-5215");
@@ -63,8 +65,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 6.7
-  Risk factor: High";
+    CVSS Temporal Score : 6.7";
 
   script_description(desc);
   script_summary("Check for the Version of ClanLite");


Property changes on: trunk/openvas-plugins/scripts/gb_clanlite_sql_inj_n_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_067_mono_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_067_mono_fc6.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_067_mono_fc6.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861467);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-067");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00068.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-January/msg00068.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of mono");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_067_mono_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_1099_gimp_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_1099_gimp_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_1099_gimp_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861309);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 15:48:41 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-1099");
   script_name( "Fedora Update for gimp FEDORA-2007-1099");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-July/msg00320.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-July/msg00320.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of gimp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_1099_gimp_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2697_galeon_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2697_galeon_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2697_galeon_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861007);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-2697");
   script_name( "Fedora Update for galeon FEDORA-2007-2697");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00418.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00418.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of galeon");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2697_galeon_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_2969_mono_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_2969_mono_fc8.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_2969_mono_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861370);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-2969");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00182.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00182.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of mono");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_2969_mono_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_3255_perl_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_3255_perl_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_3255_perl_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861491);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-3255");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00353.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00353.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of perl");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_3255_perl_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_712_kernel_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_712_kernel_fc6.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_712_kernel_fc6.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861187);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-712");
   script_name( "Fedora Update for kernel FEDORA-2007-712");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00355.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00355.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_712_kernel_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_737_xen_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_737_xen_fc6.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_737_xen_fc6.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861412);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2007-737");
@@ -51,10 +53,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00075.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00075.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of xen");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_737_xen_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2007_757_htdig_fc6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2007_757_htdig_fc6.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2007_757_htdig_fc6.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861262);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2007-757");
@@ -55,10 +57,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00116.html
+  https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00116.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of htdig");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2007_757_htdig_fc6.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_0506_tog-pegasus_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_0506_tog-pegasus_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_0506_tog-pegasus_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860061);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-0506");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00424.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00424.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of tog-pegasus");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_0506_tog-pegasus_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_0904_bind_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_0904_bind_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_0904_bind_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860907);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-0904");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of bind");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_0904_bind_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_10638_samba_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_10638_samba_fc8.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_10638_samba_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860756);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 14:16:57 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-10638");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of samba");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_10638_samba_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_11208_phpMyAdmin_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_11208_phpMyAdmin_fc9.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_11208_phpMyAdmin_fc9.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860590);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-13 10:35:30 +0100 (Fri, 13 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-11208");
   script_name( "Fedora Update for phpMyAdmin FEDORA-2008-11208");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00757.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00757.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of phpMyAdmin");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_11208_phpMyAdmin_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_1758_dnssec-tools_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_1758_dnssec-tools_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_1758_dnssec-tools_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860527);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 14:16:57 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-1758");
   script_name( "Fedora Update for dnssec-tools FEDORA-2008-1758");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00820.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00820.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of dnssec-tools");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_1758_dnssec-tools_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_2370_roundup_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_2370_roundup_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_2370_roundup_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860939);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:22:52 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-2370");
   script_name( "Fedora Update for roundup FEDORA-2008-2370");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of roundup");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_2370_roundup_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_2812_seamonkey_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_2812_seamonkey_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_2812_seamonkey_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860876);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-16 16:22:52 +0100 (Mon, 16 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-2812");
   script_name( "Fedora Update for seamonkey FEDORA-2008-2812");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00010.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00010.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of seamonkey");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_2812_seamonkey_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_3010_pdns-recursor_fc7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_3010_pdns-recursor_fc7.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_3010_pdns-recursor_fc7.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860380);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 16:43:56 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-3010");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of pdns-recursor");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_3010_pdns-recursor_fc7.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_6127_liferea_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_6127_liferea_fc8.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_6127_liferea_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860642);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:01:32 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-6127");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00201.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00201.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of liferea");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_6127_liferea_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_6140_bluez-utils_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_6140_bluez-utils_fc8.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_6140_bluez-utils_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860471);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:01:32 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-6140");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00396.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00396.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bluez-utils");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_6140_bluez-utils_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_6491_epiphany-extensions_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_6491_epiphany-extensions_fc8.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_6491_epiphany-extensions_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860354);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:01:32 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2008-6491");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00676.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00676.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of epiphany-extensions");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_6491_epiphany-extensions_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_7463_wordpress_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_7463_wordpress_fc8.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_7463_wordpress_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860867);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:03:12 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-7463");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00502.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00502.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of wordpress");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_7463_wordpress_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8069_ssmtp_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8069_ssmtp_fc9.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8069_ssmtp_fc9.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860517);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"2.6");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2008-8069");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00768.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00768.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of ssmtp");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8069_ssmtp_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8073_fedora-package-config-smart_fc9.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8073_fedora-package-config-smart_fc9.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8073_fedora-package-config-smart_fc9.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860314);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-8073");
   script_name( "Fedora Update for fedora-package-config-smart FEDORA-2008-8073");
@@ -43,10 +45,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00800.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00800.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of fedora-package-config-smart");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8073_fedora-package-config-smart_fc9.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygems_fc8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygems_fc8.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygems_fc8.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(860486);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-17 17:05:11 +0100 (Tue, 17 Feb 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2008-8282");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00322.html
+  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00322.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of rubygems");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2008_8282_rubygems_fc8.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_0601_php-ZendFramework_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_0601_php-ZendFramework_fc11.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_0601_php-ZendFramework_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861735);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-0601");
   script_name("Fedora Update for php-ZendFramework FEDORA-2010-0601");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033990.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033990.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of php-ZendFramework");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_0601_php-ZendFramework_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_10344_xulrunner_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_10344_xulrunner_fc12.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_10344_xulrunner_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862204);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-06-25 12:25:26 +0200 (Fri, 25 Jun 2010)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-10344");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_10344_xulrunner_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_1219_bltk_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_1219_bltk_fc12.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_1219_bltk_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861697);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-1219");
   script_name("Fedora Update for bltk FEDORA-2010-1219");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034477.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034477.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bltk");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_1219_bltk_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_12481_znc_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_12481_znc_fc13.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_12481_znc_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(862308);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-13 14:24:53 +0200 (Fri, 13 Aug 2010)");
   script_tag(name:"cvss_base", value:"5.0");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2010-12481");
   script_cve_id("CVE-2010-2812", "CVE-2010-2934");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_12481_znc_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_13702_libmikmod_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_13702_libmikmod_fc13.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_13702_libmikmod_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862391);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-10 14:21:00 +0200 (Fri, 10 Sep 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "FEDORA", value: "2010-13702");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_13702_libmikmod_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_19193_opensc_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_19193_opensc_fc13.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_19193_opensc_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862771);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-19193");
   script_tag(name:"cvss_base", value:"7.2");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_19193_opensc_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_2762_curl_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_2762_curl_fc12.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_2762_curl_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861773);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-2762");
   script_name("Fedora Update for curl FEDORA-2010-2762");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036744.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036744.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of curl");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_2762_curl_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_3787_drupal_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_3787_drupal_fc12.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_3787_drupal_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861764);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-3787");
   script_name("Fedora Update for drupal FEDORA-2010-3787");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036619.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036619.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of drupal");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_3787_drupal_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_4318_trac_fc12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_4318_trac_fc12.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_4318_trac_fc12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861838);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-06 08:56:44 +0200 (Tue, 06 Apr 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-4318");
   script_name("Fedora Update for trac FEDORA-2010-4318");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038240.html
+  http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038240.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of trac");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_4318_trac_fc12.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_6077_kdebase_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_6077_kdebase_fc11.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_6077_kdebase_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861882);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-04-19 16:47:49 +0200 (Mon, 19 Apr 2010)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-6077");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_6077_kdebase_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_8273_texlive_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_8273_texlive_fc11.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_8273_texlive_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861970);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-8273");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_8273_texlive_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2010_8547_kdebase_fc11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2010_8547_kdebase_fc11.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2010_8547_kdebase_fc11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(861997);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2010-8547");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2010_8547_kdebase_fc11.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_0111_feh_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_0111_feh_fc14.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_0111_feh_fc14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863109);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-03 09:20:26 +0200 (Fri, 03 Jun 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-0111");
   script_tag(name:"cvss_base", value:"5.1");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_0111_feh_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_0650_tor_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_0650_tor_fc13.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_0650_tor_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863130);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-10 16:29:51 +0200 (Fri, 10 Jun 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-0650");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_0650_tor_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_1958_q_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_1958_q_fc13.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_1958_q_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862870);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-1958");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_1958_q_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_4897_dhcp_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_4897_dhcp_fc14.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_4897_dhcp_fc14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(862990);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-19 07:58:39 +0200 (Tue, 19 Apr 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-4897");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_4897_dhcp_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_6205_firefox_fc13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_6205_firefox_fc13.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_6205_firefox_fc13.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863084);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-10 14:04:15 +0200 (Tue, 10 May 2011)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-6205");
   script_name("Fedora Update for firefox FEDORA-2011-6205");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_6205_firefox_fc13.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_7822_gdm_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_7822_gdm_fc15.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_7822_gdm_fc15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(863145);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-12 08:00:26 +0200 (Tue, 12 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.2");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-7822");
   script_cve_id("CVE-2011-1709");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_7822_gdm_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8421_xen_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8421_xen_fc15.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8421_xen_fc15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(863320);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-12 08:00:26 +0200 (Tue, 12 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.4");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "FEDORA", value: "2011-8421");
   script_cve_id("CVE-2011-1898", "CVE-2011-1583");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8421_xen_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_fedora_2011_8494_rubygem-activesupport_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_8494_rubygem-activesupport_fc15.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_8494_rubygem-activesupport_fc15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(863315);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-12 08:00:26 +0200 (Tue, 12 Jul 2011)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "FEDORA", value: "2011-8494");


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_8494_rubygem-activesupport_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_filecopa_ftp_server_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_filecopa_ftp_server_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_filecopa_ftp_server_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_filecopa_ftp_server_detect.nasl 5291 2009-10-22 19:36:29Z oct $
+# $Id$
 #
 # FileCopa FTP Server Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(801124);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-22 15:34:45 +0200 (Thu, 22 Oct 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("FileCopa FTP Server Version Detection");
   desc = "
   Overview: This script detects the installed version of FileCopa FTP Server
-  and sets the result in KB.
+  and sets the result in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of FileCopa FTP Server");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_filecopa_ftp_server_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_goldenftp_pass_cmd_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_goldenftp_pass_cmd_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_goldenftp_pass_cmd_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_goldenftp_pass_cmd_bof_vuln.nasl 13389 2011-06-07 12:10:17Z jun $
+# $Id$
 #
 # Golden FTP PASS Command Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802024);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-13 15:28:04 +0200 (Mon, 13 Jun 2011)");
   script_cve_id("CVE-2006-6576");
   script_bugtraq_id(45957, 45924);
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_goldenftp_pass_cmd_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_win.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_graphicsmagick_detect_win.nasl 1015 2009-02-16 09:15:50Z feb $
+# $Id$
 #
 # GraphicsMagick Version Detection (Win)
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(800514);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-18 15:32:11 +0100 (Wed, 18 Feb 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("GraphicsMagick Version Detection (Win)");
   desc = "
 
   Overview: This script detects the installed version of GraphicsMagick
-  and sets the version in KB.
+  and sets the version in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Sets KB for Version of GraphicsMagick");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_graphicsmagick_detect_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_graphicsmagick_mult_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_graphicsmagick_mult_vuln_lin.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_graphicsmagick_mult_vuln_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_graphicsmagick_mult_vuln_lin.nasl 1015 2009-02-16 15:12:39Z feb $
+# $Id$
 #
 # GraphicsMagick Multiple Vulnerabilities (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800517);
-  script_version("$Revision: 1.1 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-18 15:32:11 +0100 (Wed, 18 Feb 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-6070", "CVE-2008-6071", "CVE-2008-6072", "CVE-2008-6621");
@@ -70,8 +72,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.4";
 
   script_description(desc);
   script_summary("Check for the version of GraphicsMagick");


Property changes on: trunk/openvas-plugins/scripts/gb_graphicsmagick_mult_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835024);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00165");
   script_name( "HP-UX Update for PRM or WLM HPSBUX00165");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994462-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00994462-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of PRM or WLM");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00165.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835097);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "00303");
   script_name( "HP-UX Update for Bind 8.1.2 HPSBUX00303");
@@ -47,10 +49,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00909786-1
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00909786-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Bind 8.1.2");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX00303.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835164);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "HPSBUX", value: "02351");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01506861-6
+  http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01506861-6";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of BIND");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02351.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02655.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02655.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02655.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(835255);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-05 07:14:22 +0200 (Thu, 05 May 2011)");
   script_tag(name:"cvss_base", value:"4.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "HPSBUX", value: "02655");


Property changes on: trunk/openvas-plugins/scripts/gb_hp_ux_HPSBUX02655.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ideal_administrator_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ideal_administrator_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ideal_administrator_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ideal_administrator_detect.nasl 6181 2009-12-11 20:10:24Z dec $
+# $Id$
 #
 # Ideal Administration Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(801087);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-12-14 09:18:47 +0100 (Mon, 14 Dec 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Ideal Administration Version Detection");
   desc = "
   Overview : This script finds the installed Ideal Administration and saves the
-  version in KB.
+  version in KB.";
 
-  Risk factor : None";
-
   script_description(desc);
   script_summary("Set Version of Ideal Administration in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ideal_administrator_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_limny_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_limny_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_limny_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_limny_detect.nasl 7455 2010-03-01 10:20:36Z mar $
+# $Id$
 #
 # Limny Version Detection
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(800295);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-03-02 12:02:59 +0100 (Tue, 02 Mar 2010)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Limny Version Detection");
   desc = "
   Overview: This script finds the installed Limny version and saves
-  the result in KB.
+  the result in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Set the version of Limny in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_limny_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_030.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_030.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_030.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830157);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:030");
   script_name( "Mandriva Update for lsb MDKA-2007:030 (lsb)");
@@ -45,10 +47,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-05/msg00002.php
+  http://lists.mandriva.com/security-announce/2007-05/msg00002.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of lsb");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_030.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_092.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_092.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_092.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830133);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:48:43 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKA", value: "2007:092");
   script_name( "Mandriva Update for mc MDKA-2007:092 (mc)");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-10/msg00004.php
+  http://lists.mandriva.com/security-announce/2007-10/msg00004.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of mc");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKA_2007_092.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_136.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_136.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_136.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830269);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDKSA", value: "2007:136");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2007-06/msg00045.php
+  http://lists.mandriva.com/security-announce/2007-06/msg00045.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of evolution");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDKSA_2007_136.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_004.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_004.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_004.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830586);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:004");
   script_name( "Mandriva Update for timezone MDVA-2008:004 (timezone)");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-01/msg00005.php
+  http://lists.mandriva.com/security-announce/2008-01/msg00005.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of timezone");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_004.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_067.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_067.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_067.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830510);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:067");
   script_name( "Mandriva Update for ksplash-engine-moodin MDVA-2008:067 (ksplash-engine-moodin)");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-05/msg00023.php
+  http://lists.mandriva.com/security-announce/2008-05/msg00023.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ksplash-engine-moodin");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_067.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_068.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_068.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_068.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830529);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:068");
   script_name( "Mandriva Update for mandriva-kde-config MDVA-2008:068 (mandriva-kde-config)");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-05/msg00024.php
+  http://lists.mandriva.com/security-announce/2008-05/msg00024.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of mandriva-kde-config");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_068.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_083.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_083.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_083.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830745);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:05:19 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2008:083");
   script_name( "Mandriva Update for GConf2 MDVA-2008:083 (GConf2)");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-06/msg00004.php
+  http://lists.mandriva.com/security-announce/2008-06/msg00004.php";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of GConf2");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2008_083.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_230.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_230.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_230.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831260);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-02 08:39:14 +0100 (Thu, 02 Dec 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVA", value: "2010:230");
   script_name("Mandriva Update for kolab-webadmin MDVA-2010:230 (kolab-webadmin)");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2010_230.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_137.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_137.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_137.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(830753);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2008:137");
@@ -60,10 +62,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://lists.mandriva.com/security-announce/2008-07/msg00016.php
+  http://lists.mandriva.com/security-announce/2008-07/msg00016.php";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2008_137.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_097.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_097.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_097.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831051);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2010:097");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_097.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_152.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_152.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_152.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831131);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-20 14:57:11 +0200 (Fri, 20 Aug 2010)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "MDVSA", value: "2010:152");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_152.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_162.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_162.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_162.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831140);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-30 16:59:25 +0200 (Mon, 30 Aug 2010)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:162");
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_162.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_180.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_180.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_180.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831160);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-09-22 08:32:53 +0200 (Wed, 22 Sep 2010)");
   script_tag(name:"cvss_base", value:"7.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "MDVSA", value: "2010:180");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2010_180.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_060.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_060.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_060.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831358);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-04-06 16:20:31 +0200 (Wed, 06 Apr 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2011:060");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_060.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_112.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_112.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_112.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(831424);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-22 14:44:51 +0200 (Fri, 22 Jul 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "MDVSA", value: "2011:112");


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_112.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl 4375 2009-08-31 20:03:29Z aug $
+# $Id$
 #
 # Mozilla Products Address Bar Spoofing Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800876);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-02 11:50:45 +0200 (Wed, 02 Sep 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-3007");
@@ -59,8 +61,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.3 (AV:N/AC:M/Au:NR/C:N/I:P/A:N)
-    CVSS Temporal Score : 3.9
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.9";
 
   script_description(desc);
   script_summary("Check for the version of Mozilla Products");


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_addr_bar_spoofing_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_ie_npl_info_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_ie_npl_info_disc_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ms_ie_npl_info_disc_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_ie_npl_info_disc_vuln.nasl 7117 2010-02-05 12:40:05Z feb $
+# $Id$
 #
 # Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800461);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-02-08 10:53:20 +0100 (Mon, 08 Feb 2010)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2010-0255");
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.1
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.1";
 
   script_description(desc);
   script_summary("Check for the version of Internet Explorer");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_ie_npl_info_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ms_iis_ftpd_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_iis_ftpd_dos_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ms_iis_ftpd_dos_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_ms_iis_ftpd_dos_vuln.nasl 12762 2010-12-22 15:15:15Z dec $
+# $Id$
 #
 # Microsoft Windows IIS FTP Server DOS Vulnerability
 #
@@ -30,7 +30,9 @@
 if(description)
 {
   script_id(801669);
-  script_version("$Revision$: 1.1");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-27 09:55:05 +0100 (Mon, 27 Dec 2010)");
   script_cve_id("CVE-2010-3972");
   script_bugtraq_id(45542);
   script_tag(name:"cvss_base", value:"10.0");


Property changes on: trunk/openvas-plugins/scripts/gb_ms_iis_ftpd_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_multicms_46062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_multicms_46062.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_multicms_46062.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(103052);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-02-01 12:59:13 +0100 (Tue, 01 Feb 2011)");
  script_bugtraq_id(46062);
- script_version ("1.0-$Revision$");
 
  script_name("MultiCMS 'lng' Parameter Local File Include Vulnerability");
 


Property changes on: trunk/openvas-plugins/scripts/gb_multicms_46062.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win_dec10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win_dec10.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win_dec10.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_opera_mult_vuln_win_dec10.nasl 12759 2010-12-22 11:51:11Z dec $
+# $Id$
 #
 # Opera Browser Multiple Vulnerabilities December-10 (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801495);
-  script_version("Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-12-27 09:55:05 +0100 (Mon, 27 Dec 2010)");
   script_cve_id("CVE-2010-4579", "CVE-2010-4580", "CVE-2010-4581", "CVE-2010-4582",
                 "CVE-2010-4583", "CVE-2010-4584", "CVE-2010-4585", "CVE-2010-4586",
                 "CVE-2010-4587");


Property changes on: trunk/openvas-plugins/scripts/gb_opera_mult_vuln_win_dec10.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_phorum_xss_n_csrf_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_phorum_xss_n_csrf_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_phorum_xss_n_csrf_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_phorum_xss_n_csrf_vuln.nasl 17049 2011-09-13 13:10:20Z sep $
+# $Id$
 #
 # Phorum Cross-Site Scripting and Cross-site request forgery Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802160);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-16 17:22:17 +0200 (Fri, 16 Sep 2011)");
   script_cve_id("CVE-2011-3381", "CVE-2011-3382");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/gb_phorum_xss_n_csrf_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_postnuke_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_postnuke_sql_inj_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_postnuke_sql_inj_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ##############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_postnuke_sql_inj_vuln.nasl 8802 2010-05-07 14:10:29 may $
+# $Id$
 #
 # PostNuke modload Module 'sid' Parameter SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800771);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-19 14:50:39 +0200 (Wed, 19 May 2010)");
   script_cve_id("CVE-2010-1713");
   script_bugtraq_id(39713);
   script_tag(name:"cvss_base", value:"7.5");


Property changes on: trunk/openvas-plugins/scripts/gb_postnuke_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_jun09_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_jun09_lin.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_jun09_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_seamonkey_mult_vuln_jun09_lin.nasl 2940 2009-06-16 10:30:36Z jun $
+# $Id$
 #
 # Mozilla Seamonkey Multiple Vulnerabilities Jun-09 (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800641);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-16 15:11:01 +0200 (Tue, 16 Jun 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-1832", "CVE-2009-1833", "CVE-2009-1834", "CVE-2009-1835",
@@ -86,8 +88,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the version of Seamonkey");


Property changes on: trunk/openvas-plugins/scripts/gb_seamonkey_mult_vuln_jun09_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_simple_machines_forum_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_simple_machines_forum_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_simple_machines_forum_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_simple_machines_forum_detect.nasl 1556 2009-04-16 13:52:24Z apr $
+# $Id$
 #
 # Simple Machines Forum Version Detection
 #
@@ -30,7 +30,9 @@
 if(description)
 {
   script_id(800557);
-  script_version("$Revision: 1.1$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-23 08:16:04 +0200 (Thu, 23 Apr 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Simple Machines Forum Version Detection");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_simple_machines_forum_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_snort_detect_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_snort_detect_lin.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_snort_detect_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_snort_detect_lin.nasl 5534 2009-11-02 20:00:29Z nov $
+# $Id$
 #
 # Snort Version Detection (Linux)
 #
@@ -27,15 +27,15 @@
 if(description)
 {
   script_id(801138);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-11-02 14:39:30 +0100 (Mon, 02 Nov 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("Snort Version Detection (Linux)");
   desc = "
   Overview: This script detects the installed version of Snort and
-  sets the reuslt in KB.
+  sets the reuslt in KB.";
 
-  Risk Factor: None";
-
   script_description(desc);
   script_summary("Set KB for the version of Snort");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_snort_detect_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_109454_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_109454_06.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_109454_06.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855452);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:37:58 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "109454-06");
   script_name( "Solaris Update for connld, fifofs, fifonode 109454-06");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-109454-06-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-109454-06-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of connld, fifofs, fifonode");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_109454_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_110416_07.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_110416_07.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_110416_07.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855387);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "110416-07");
   script_name( "Solaris Update for ATOK12 110416-07");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110416-07-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-110416-07-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ATOK12");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_110416_07.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_114046_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_114046_03.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_114046_03.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855341);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:24:08 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "114046-03");
   script_name( "Solaris Update for Netscape Portable Runtime(4.1.4)/Network Security System(3.3.4) 114046-03");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114046-03-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114046-03-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of Netscape Portable Runtime(4.1.4)/Network Security System(3.3.4)");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_114046_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_114674_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_114674_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_114674_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855151);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:24:08 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "114674-01");
   script_name( "Solaris Update for /usr/sbin/wall 114674-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114674-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-114674-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of /usr/sbin/wall");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_114674_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_116775_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_116775_03.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_116775_03.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855180);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "116775-03");
   script_name( "Solaris Update for ping 116775-03");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-116775-03-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-116775-03-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of ping");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_116775_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_117350_62.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_117350_62.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_117350_62.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855081);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "117350-62");
   script_name( "Solaris Update for kernel 117350-62");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-62-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-62-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_117350_62.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_122092_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_122092_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_122092_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855320);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:31:50 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "122092-01");
   script_name( "Solaris Update for perl 122092-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122092-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-122092-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of perl");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_122092_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_137402_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_137402_02.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_137402_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855459);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:34:39 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "137402-02");
   script_name( "Solaris Update for snmpXdmid 137402-02");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-137402-02-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-137402-02-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of snmpXdmid");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_137402_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_138387_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_138387_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_138387_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855088);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:34:39 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "SUNSolve", value: "138387-01");
@@ -46,10 +48,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138387-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-138387-01-1";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of libc.so.1.9");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_138387_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_solaris_140102_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_solaris_140102_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_solaris_140102_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(855385);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-06-03 12:34:39 +0200 (Wed, 03 Jun 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "SUNSolve", value: "140102-01");
   script_name( "Solaris Update for rpc.ypupdated 140102-01");
@@ -44,10 +46,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://sunsolve.sun.com/search/document.do?assetkey=1-21-140102-01-1
+  http://sunsolve.sun.com/search/document.do?assetkey=1-21-140102-01-1";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of rpc.ypupdated");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_solaris_140102_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_sun_java_se_unspecified_vuln_aug09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_sun_java_se_unspecified_vuln_aug09.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_sun_java_se_unspecified_vuln_aug09.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_sun_java_se_unspecified_vuln_aug09.nasl 3821 2009-08-19 15:43:20Z aug $
+# $Id$
 #
 # Sun Java SE Unspecified Vulnerability In JDK/JRE/SDK - Aug09
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800869);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-08-20 09:27:17 +0200 (Thu, 20 Aug 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-2676");
@@ -72,8 +74,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.0
-  Risk factor: High";
+    CVSS Temporal Score : 5.0";
 
   script_description(desc);
   script_summary("Check for the version of Sun Java JDK/JRE");


Property changes on: trunk/openvas-plugins/scripts/gb_sun_java_se_unspecified_vuln_aug09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_suse_2008_056.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_suse_2008_056.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_suse_2008_056.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(850001);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-23 16:44:26 +0100 (Fri, 23 Jan 2009)");
   script_tag(name:"cvss_base", value:"4.7");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "SUSE-SA", value: "2008-056");
@@ -72,10 +74,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  http://www.novell.com/linux/security/advisories/2008_56_kernel.html
+  http://www.novell.com/linux/security/advisories/2008_56_kernel.html";
 
-  Risk factor : Medium";
-
   script_description(desc);
   script_summary("Check for the Version of kernel");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_suse_2008_056.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_tugzip_file_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_tugzip_file_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_tugzip_file_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_tugzip_file_bof_vuln.nasl 0407 2008-10-31 11:30:58Z oct $
+# $Id$
 #
 # TUGzip zip File Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800122);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-10-31 15:07:51 +0100 (Fri, 31 Oct 2008)");
   script_tag(name:"cvss_base", value:"9.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-4779");
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.0 (AV:N/AC:L/Au:NR/C:P/I:P/A:C)
-    CVSS Temporal Score : 8.1
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.1";
 
   script_description(desc);
   script_summary("Check for the Version of TUGzip");


Property changes on: trunk/openvas-plugins/scripts/gb_tugzip_file_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1053_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1053_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1053_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840580);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-04 14:19:53 +0100 (Fri, 04 Feb 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1053-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1053_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1057_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1057_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1057_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840581);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-04 14:19:53 +0100 (Fri, 04 Feb 2011)");
   script_tag(name:"cvss_base", value:"7.9");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1057-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1057_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1108_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1108_2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1108_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840645);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-05-10 14:04:15 +0200 (Tue, 10 May 2011)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1108-2");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1108_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1148_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1148_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1148_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840678);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-06-20 08:37:08 +0200 (Mon, 20 Jun 2011)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1148-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1148_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1159_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1159_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1159_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840700);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-07-18 15:23:56 +0200 (Mon, 18 Jul 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1159-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1159_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1180_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1180_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1180_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,8 +26,10 @@
 if(description)
 {
   script_id(840709);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-02 09:08:31 +0200 (Tue, 02 Aug 2011)");
   script_tag(name:"cvss_base", value:"4.0");
- script_version("$Revision$: 1.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "1180-1");
   script_cve_id("CVE-2011-2511");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1180_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1218_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1218_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1218_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840760);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-30 16:02:57 +0200 (Fri, 30 Sep 2011)");
   script_tag(name:"cvss_base", value:"6.1");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1218-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1218_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1222_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1222_2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1222_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840767);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-10 16:05:48 +0200 (Mon, 10 Oct 2011)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "1222-2");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1222_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1244_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1244_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1244_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840787);
-  script_version("$Revision: $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-31 13:45:00 +0100 (Mon, 31 Oct 2011)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "1244-1");


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1244_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_444_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_444_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_444_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840170);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "444-1");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-March/000513.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-March/000513.html";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the Version of openoffice.org(2)/-amd64, ia32-libs-openoffice.org vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_444_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_454_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_454_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_454_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840046);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.0");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "454-1");
@@ -62,10 +64,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-April/000524.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-April/000524.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of postgresql-8.1, postgresql-8.2 vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_454_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_483_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_483_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_483_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840172);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:55:18 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "483-1");
@@ -53,10 +55,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-July/000556.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-July/000556.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of libnet-dns-perl vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_483_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_522_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_522_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_522_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840078);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "522-1");
@@ -54,10 +56,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-September/000599.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-September/000599.html";
 
-  Risk factor : High";
-
   script_description(desc);
   script_summary("Check for the Version of openssl vulnerabilities");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_522_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_537_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_537_2.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_537_2.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840019);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.2");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "537-2");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-November/000618.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2007-November/000618.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of compiz vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_537_2.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_11.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_11.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840276);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "612-11");
   script_name( "Ubuntu Update for openssl-blacklist update USN-612-11");
@@ -58,10 +60,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-June/000720.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-June/000720.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of openssl-blacklist update");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_612_11.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_622_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_622_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_622_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840251);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"6.4");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "622-1");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-July/000726.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-July/000726.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of bind9 vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_622_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_631_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_631_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_631_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840277);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_xref(name: "USN", value: "631-1");
@@ -48,10 +50,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-July/000734.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-July/000734.html";
 
-  Risk factor: High";
-
   script_description(desc);
   script_summary("Check for the Version of poppler vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_631_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_634_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_634_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_634_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840220);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "634-1");
@@ -49,10 +51,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-August/000738.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-August/000738.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of openldap2.2, openldap2.3 vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_634_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_640_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_640_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_640_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840258);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.3");
   script_tag(name:"risk_factor", value:"Medium");
   script_xref(name: "USN", value: "640-1");
@@ -50,10 +52,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-September/000745.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-September/000745.html";
 
-  Risk factor: Medium";
-
   script_description(desc);
   script_summary("Check for the Version of libxml2 vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_640_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_ubuntu_USN_662_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_662_1.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_662_1.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
   script_id(840296);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)");
   script_tag(name:"cvss_base", value:"8.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_xref(name: "USN", value: "662-1");
@@ -52,10 +54,8 @@
   Fix: Please Install the Updated Packages.
 
   References:
-  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-November/000770.html
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-November/000770.html";
 
-  Risk factor : Critical";
-
   script_description(desc);
   script_summary("Check for the Version of linux vulnerability");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_662_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_v-webmail_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_v-webmail_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_v-webmail_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_v-webmail_detect.nasl 3220 2009-07-02 19:48:24Z jul $
+# $Id$
 #
 # V-webmail Version Detection
 #
@@ -27,16 +27,16 @@
 if(description)
 {
   script_id(800821);
-  script_version("Revision: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-07-03 15:23:01 +0200 (Fri, 03 Jul 2009)");
   script_tag(name:"risk_factor", value:"None");
   script_name("V-webmail Version Detection");
   desc = "
 
   Overview: This script detects the installed version of V-webmail and
-  sets the result in KB.
+  sets the result in KB.";
 
-  Risk factor: None";
-
   script_description(desc);
   script_summary("Set Version of V-webmail in KB");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/gb_v-webmail_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vlc_media_player_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vlc_media_player_dos_vuln_win.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_vlc_media_player_dos_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vlc_media_player_dos_vuln_win.nasl 10683 2010-08-16 17:23:17 aug $
+# $Id$
 #
 # VLC Media Player Meta-Information Denial of Service Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801429);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-19 10:23:11 +0200 (Thu, 19 Aug 2010)");
   script_cve_id("CVE-2010-2937");
   script_bugtraq_id(42386);
   script_tag(name:"cvss_base", value:"5.0");


Property changes on: trunk/openvas-plugins/scripts/gb_vlc_media_player_dos_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_vlc_media_player_intgr_bof_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_vlc_media_player_intgr_bof_vuln_win.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_vlc_media_player_intgr_bof_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_vlc_media_player_intgr_bof_vuln_win.nasl 585 2008-12-04 14:49:25Z dec $
+# $Id$
 #
 # VLC Media Player Buffer Overflow Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800076);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-09 13:27:23 +0100 (Tue, 09 Dec 2008)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2008-5276");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 6.9
-  Risk factor: Critical";
+    CVSS Temporal Score : 6.9";
 
   script_description(desc);
   script_summary("Check for the Version of VLC Media Player");


Property changes on: trunk/openvas-plugins/scripts/gb_vlc_media_player_intgr_bof_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_winamp_gen_msn_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_winamp_gen_msn_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_winamp_gen_msn_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_winamp_gen_msn_bof_vuln.nasl 776 2009-03-10 15:21:38Z mar $
+# $Id$
 #
 # Winamp gen_msn.dll Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(800531);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-12 08:39:03 +0100 (Thu, 12 Mar 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0833");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 8.4
-  Risk factor: Critical";
+    CVSS Temporal Score : 8.4";
 
   script_description(desc);
   script_summary("Check for the Size of Winamp's gen_msn.dll File");


Property changes on: trunk/openvas-plugins/scripts/gb_winamp_gen_msn_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_wireshark_dissector_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wireshark_dissector_dos_vuln_win.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_wireshark_dissector_dos_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_wireshark_dissector_dos_vuln_win.nasl 10697 2010-08-17 16:54:17 aug $
+# $Id$
 #
 # Wireshark 'packet-gsm_a_rr.c' Denial of Service Vulnerability (Win)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801433);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-08-19 10:23:11 +0200 (Thu, 19 Aug 2010)");
   script_cve_id("CVE-2010-2992");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/gb_wireshark_dissector_dos_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_wordpress_mult_themes_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wordpress_mult_themes_xss_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_wordpress_mult_themes_xss_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_wordpress_mult_themes_xss_vuln.nasl 17579 2011-10-03 14:14:14Z oct $
+# $Id$
 #
 # WordPress Multiple Themes 's' Parameter Cross Site Scripting Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(802250);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-10-04 16:55:13 +0200 (Tue, 04 Oct 2011)");
   script_bugtraq_id(49865, 49872, 49868, 49867, 49869, 49875, 49873, 49880);
   script_cve_id("CVE-2011-3850", "CVE-2011-3852", "CVE-2011-3854", "CVE-2011-3855",
                 "CVE-2011-3856", "CVE-2011-3857", "CVE-2011-3858", "CVE-2011-3860",


Property changes on: trunk/openvas-plugins/scripts/gb_wordpress_mult_themes_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/gb_xwiki_enterprise_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_xwiki_enterprise_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/gb_xwiki_enterprise_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: gb_xwiki_enterprise_detect.nasl 12895 2011-02-07 16:16:16Z feb $
+# $Id$
 #
 # XWiki Enterprise Version Detection
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(801840);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-02-08 15:34:31 +0100 (Tue, 08 Feb 2011)");
   script_tag(name:"risk_factor", value:"None");
   script_name("XWiki Enterprise Version Detection");
   desc = "


Property changes on: trunk/openvas-plugins/scripts/gb_xwiki_enterprise_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200310_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200310_03.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200310_03.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(54498);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(9504, 8911);
  script_cve_id("CVE-2003-0542");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200310-03 (Apache)";
@@ -52,10 +54,8 @@
     # /etc/init.d/apache restart
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200310-03
-http://bugs.gentoo.org/show_bug.cgi?id=32194
+http://bugs.gentoo.org/show_bug.cgi?id=32194";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200310-03 (Apache)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200310_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200402_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200402_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200402_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54519);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200402-01 (PHP)";
  script_name(name);
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200402-01
 http://bugs.gentoo.org/show_bug.cgi?id=39952
-http://bugs.php.net/bug.php?id=25753
+http://bugs.php.net/bug.php?id=25753";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200402-01 (PHP)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200402_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200405_25.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200405_25.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200405_25.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54585);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200405-25 (tla)";
  script_name(name);
@@ -48,10 +50,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200405-25
 http://bugs.gentoo.org/show_bug.cgi?id=51586
 http://www.gentoo.org/security/en/glsa/glsa-200405-01.xml
-http://www.gentoo.org/security/en/glsa/glsa-200405-13.xml
+http://www.gentoo.org/security/en/glsa/glsa-200405-13.xml";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200405-25 (tla)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200405_25.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200408_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200408_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200408_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54631);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200408-01 (MPlayer)";
  script_name(name);
@@ -49,10 +51,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200408-01
 http://bugs.gentoo.org/show_bug.cgi?id=55456
 http://www.securityfocus.com/bid/10615/
-http://www.open-security.org/advisories/5
+http://www.open-security.org/advisories/5";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200408-01 (MPlayer)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200408_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200408_14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200408_14.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200408_14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54644);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200408-14 (acroread)";
  script_name(name);
@@ -49,10 +51,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200408-14
 http://bugs.gentoo.org/show_bug.cgi?id=60205
 http://idefense.com/application/poi/display?id=124&type=vulnerabilities
-http://idefense.com/application/poi/display?id=125&type=vulnerabilities
+http://idefense.com/application/poi/display?id=125&type=vulnerabilities";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200408-14 (acroread)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200408_14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200409_19.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200409_19.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200409_19.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(54675);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(10967);
  script_cve_id("CVE-2004-0794");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200409-19 (heimdal)";
@@ -52,10 +54,8 @@
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200409-19
 http://bugs.gentoo.org/show_bug.cgi?id=61412
 http://www.pdc.kth.se/heimdal/advisory/2004-09-13/
-http://www.frasunek.com/lukemftpd.txt
+http://www.frasunek.com/lukemftpd.txt";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200409-19 (heimdal)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200409_19.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200411_30.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200411_30.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200411_30.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54751);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2004-0888");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200411-30 (pdftohtml)";
@@ -49,10 +51,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200411-30
 http://bugs.gentoo.org/show_bug.cgi?id=69019
-http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
+http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200411-30 (pdftohtml)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200411_30.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200502_32.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200502_32.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200502_32.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(54864);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-0160", "CVE-2005-0161");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200502-32 (unace)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=app-arch/unace-1.2b-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200502-32
-http://bugs.gentoo.org/show_bug.cgi?id=81958
+http://bugs.gentoo.org/show_bug.cgi?id=81958";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200502-32 (unace)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200502_32.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200504_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200504_03.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200504_03.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(54905);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Low");
  name = "Gentoo Security Advisory GLSA 200504-03 (Dnsmasq)";
  script_name(name);
@@ -46,10 +48,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200504-03
 http://bugs.gentoo.org/show_bug.cgi?id=86718
-http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
+http://www.thekelleys.org.uk/dnsmasq/CHANGELOG";
 
-Risk factor : Low";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200504-03 (Dnsmasq)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200504_03.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200510_08.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200510_08.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200510_08.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(55574);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(15044);
  script_cve_id("CVE-2005-2967");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200510-08 (xine-lib)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose media-libs/xine-lib
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200510-08
-http://bugs.gentoo.org/show_bug.cgi?id=107854
+http://bugs.gentoo.org/show_bug.cgi?id=107854";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200510-08 (xine-lib)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200510_08.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200511_17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200511_17.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200511_17.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(55904);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(15529);
  script_cve_id("CVE-2005-3531");
- script_version ("$");
  script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200511-17 (FUSE)";
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose '>=sys-fs/fuse-2.4.1-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200511-17
-http://bugs.gentoo.org/show_bug.cgi?id=112902
+http://bugs.gentoo.org/show_bug.cgi?id=112902";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200511-17 (FUSE)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200511_17.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200512_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200512_02.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200512_02.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(55975);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2005-3912");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200512-02 (webmin usermin)";
@@ -53,10 +55,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200512-02
 http://bugs.gentoo.org/show_bug.cgi?id=113888
-http://www.dyadsecurity.com/webmin-0001.html
+http://www.dyadsecurity.com/webmin-0001.html";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200512-02 (webmin usermin)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200512_02.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200512_05.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200512_05.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200512_05.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(56019);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(15103);
  script_cve_id("CVE-2005-2943");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200512-05 (xmail)";
@@ -49,10 +51,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200512-05
 http://bugs.gentoo.org/show_bug.cgi?id=109381
-http://www.idefense.com/application/poi/display?id=321&type=vulnerabilities&flashstatus=true
+http://www.idefense.com/application/poi/display?id=321&type=vulnerabilities&flashstatus=true";
 
-Risk factor : High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200512-05 (xmail)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200512_05.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200601_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200601_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200601_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(56076);
- script_version ("$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200601-01 (pinentry)";
  script_name(name);
@@ -44,10 +46,8 @@
     # emerge --ask --oneshot --verbose '>=app-crypt/pinentry-0.7.2-r2'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200601-01
-http://bugs.gentoo.org/show_bug.cgi?id=116822
+http://bugs.gentoo.org/show_bug.cgi?id=116822";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200601-01 (pinentry)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200601_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200603_23.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200603_23.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200603_23.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(56551);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(17217);
  script_cve_id("CVE-2006-1390");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200603-23 (nethack slashem falconseye)";
@@ -65,10 +67,8 @@
 http://bugs.gentoo.org/show_bug.cgi?id=125902
 http://bugs.gentoo.org/show_bug.cgi?id=122376
 http://bugs.gentoo.org/show_bug.cgi?id=127167
-http://bugs.gentoo.org/show_bug.cgi?id=127319
+http://bugs.gentoo.org/show_bug.cgi?id=127319";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200603-23 (nethack slashem falconseye)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200603_23.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200604_04.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200604_04.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200604_04.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(56558);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(17372);
  script_cve_id("CVE-2006-0051");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200604-04 (kaffeine)";
@@ -49,10 +51,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200604-04
 http://bugs.gentoo.org/show_bug.cgi?id=127326
-http://www.kde.org/info/security/advisory-20060404-1.txt
+http://www.kde.org/info/security/advisory-20060404-1.txt";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200604-04 (kaffeine)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200604_04.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200605_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200605_06.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200605_06.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,9 +27,11 @@
 if(description)
 {
  script_id(56721);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_bugtraq_id(17671);
  script_cve_id("CVE-2006-1993");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200605-06 (mozilla-firefox)";
@@ -54,10 +56,8 @@
     # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-bin-1.5.0.3'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200605-06
-http://bugs.gentoo.org/show_bug.cgi?id=131138
+http://bugs.gentoo.org/show_bug.cgi?id=131138";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200605-06 (mozilla-firefox)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200605_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200605_15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200605_15.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200605_15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(56792);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-2223", "CVE-2006-2224", "CVE-2006-2276");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200605-15 (quagga)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200605-15
 http://bugs.gentoo.org/show_bug.cgi?id=132353
-http://www.quagga.net/news2.php?y=2006&m=5&d=8#id1147115280
+http://www.quagga.net/news2.php?y=2006&m=5&d=8#id1147115280";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200605-15 (quagga)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200605_15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200609_14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200609_14.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200609_14.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57892);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-3743", "CVE-2006-3744", "CVE-2006-4144");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200609-14 (Imagemagick)";
@@ -48,10 +50,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200609-14
 http://bugs.gentoo.org/show_bug.cgi?id=144091
-http://bugs.gentoo.org/show_bug.cgi?id=143533
+http://bugs.gentoo.org/show_bug.cgi?id=143533";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200609-14 (Imagemagick)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200609_14.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200611_25.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200611_25.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200611_25.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(57938);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-5779");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Gentoo Security Advisory GLSA 200611-25 (openldap)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose 'net-nds/openldap'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200611-25
-http://bugs.gentoo.org/show_bug.cgi?id=154349
+http://bugs.gentoo.org/show_bug.cgi?id=154349";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200611-25 (openldap)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200611_25.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200703_26.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200703_26.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200703_26.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(58185);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-1536");
- script_version ("$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200703-26 (file)";
@@ -48,10 +50,8 @@
     # emerge --ask --oneshot --verbose '>=sys-apps/file-4.20'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200703-26
-http://bugs.gentoo.org/show_bug.cgi?id=171452
+http://bugs.gentoo.org/show_bug.cgi?id=171452";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200703-26 (file)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200703_26.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200803_12.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200803_12.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200803_12.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if(description)
 {
  script_id(60515);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2008-0072");
- script_version ("$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200803-12 (evolution)";
@@ -47,10 +49,8 @@
     # emerge --ask --oneshot --verbose '>=mail-client/evolution-2.12.3-r1'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200803-12
-http://bugs.gentoo.org/show_bug.cgi?id=212272
+http://bugs.gentoo.org/show_bug.cgi?id=212272";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200803-12 (evolution)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200803_12.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200812_15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200812_15.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200812_15.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(62964);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-12-23 18:28:16 +0100 (Tue, 23 Dec 2008)");
  script_cve_id("CVE-2004-0768", "CVE-2006-0481", "CVE-2006-3334", "CVE-2008-1382", "CVE-2008-3964");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  name = "Gentoo Security Advisory GLSA 200812-15 (povray)";
@@ -49,10 +51,8 @@
     # emerge --ask --oneshot --verbose '>=media-gfx/povray-3.6.1-r4'
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200812-15
-http://bugs.gentoo.org/show_bug.cgi?id=153538
+http://bugs.gentoo.org/show_bug.cgi?id=153538";
 
-Risk factor: High";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200812-15 (povray)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200812_15.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_200907_06.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200907_06.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_200907_06.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(64428);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)");
  script_cve_id("CVE-2009-0198", "CVE-2009-0509", "CVE-2009-0510", "CVE-2009-0511", "CVE-2009-0512", "CVE-2009-0888", "CVE-2009-0889", "CVE-2009-1492", "CVE-2009-1493", "CVE-2009-1855", "CVE-2009-1856", "CVE-2009-1857", "CVE-2009-1858", "CVE-2009-1859", "CVE-2009-1861", "CVE-2009-2028");
- script_version ("$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  name = "Gentoo Security Advisory GLSA 200907-06 (acroread)";
@@ -50,10 +52,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200907-06
 http://bugs.gentoo.org/show_bug.cgi?id=267846
-http://bugs.gentoo.org/show_bug.cgi?id=273908
+http://bugs.gentoo.org/show_bug.cgi?id=273908";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  summary = "Gentoo Security Advisory GLSA 200907-06 (acroread)";


Property changes on: trunk/openvas-plugins/scripts/glsa_200907_06.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201009_09.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201009_09.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_201009_09.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,10 +30,12 @@
 if(description)
 {
  script_id(69033);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"cvss_base", value:"7.2");
  script_cve_id("CVE-2008-4579", "CVE-2008-4580");
  script_tag(name:"risk_factor", value:"High");
- script_version ("$Revision$");
  script_name("Gentoo Security Advisory GLSA 201009-09 (fence)");
 
  desc = "The remote host is missing updates announced in
@@ -49,10 +51,8 @@
     # emerge --unmerge sys-cluster/fence
 
 http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201009-09
-http://bugs.gentoo.org/show_bug.cgi?id=240576
+http://bugs.gentoo.org/show_bug.cgi?id=240576";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201009-09 (fence)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201009_09.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/glsa_201012_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_201012_01.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/glsa_201012_01.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -30,8 +30,10 @@
 if(description)
 {
  script_id(69036);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)");
  script_tag(name:"risk_factor", value:"Medium");
- script_version ("$Revision$");
  script_name("Gentoo Security Advisory GLSA 201012-01 (chromium)");
 
  desc = "The remote host is missing updates announced in
@@ -66,10 +68,8 @@
 http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html
 http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html
 http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html
-http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html
+http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html";
 
-Risk factor : Medium";
-
  script_description(desc);
 
  script_summary("Gentoo Security Advisory GLSA 201012-01 (chromium)");


Property changes on: trunk/openvas-plugins/scripts/glsa_201012_01.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/hpftp_glob_stat.nasl
===================================================================
--- trunk/openvas-plugins/scripts/hpftp_glob_stat.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/hpftp_glob_stat.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -40,8 +40,10 @@
 if(description)
 {
  script_id(11372);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(2552);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_cve_id("CVE-2001-0248");
@@ -56,12 +58,9 @@
 command, which uses glob to generate long strings.
 
 Solution : upgrade your FTP server
-Consider removing directories writable by 'anonymous'.
+Consider removing directories writable by 'anonymous'.";
 
 
-Risk factor: Critical";
-
-
  script_description(desc);
 
 
@@ -130,11 +129,8 @@
 *** when testing without safe checks enabled.
 
 Solution : upgrade your FTP server and/or libc
-Consider removing directories writable by 'anonymous'.
+Consider removing directories writable by 'anonymous'.";
 
-
-Risk factor : High";
-
   security_hole(port:port, data:desc);
   }
  }

Modified: trunk/openvas-plugins/scripts/ilohamail_arbitrary_file_access_via_lang.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ilohamail_arbitrary_file_access_via_lang.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/ilohamail_arbitrary_file_access_via_lang.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -25,6 +25,8 @@
 if (description) {
   script_id(14630);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"Medium");
 
   script_xref(name:"OSVDB", value:"7400");
@@ -38,8 +40,7 @@
 the language variable that allows an unauthenticated attacker to
 retrieve arbitrary files available to the web user. 
 
-Solution : Upgrade to IlohaMail version 0.7.11 or later.
-Risk factor : Medium";
+Solution : Upgrade to IlohaMail version 0.7.11 or later.";
   script_description(desc);
  
   summary = "Checks for Arbitrary File Access via Language Variable vulnerability in IlohaMail";

Modified: trunk/openvas-plugins/scripts/interchange_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/interchange_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/interchange_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -41,8 +41,10 @@
 if(description)
 {
  script_id(11128);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(5453);
- script_version ("$Revision$");
  script_tag(name:"risk_factor", value:"None");
 
  name = "redhat Interchange";
@@ -60,9 +62,7 @@
 ** to exploit the vulnerability
 
 Solution: Upgrade your software if necessary or configure it
-for 'Unix mode' communication only.
-
-Risk factor : None / Medium";
+for 'Unix mode' communication only.";
  
  script_description(desc);
 

Modified: trunk/openvas-plugins/scripts/invision_power_board_calendar_sql_injection.nasl
===================================================================
--- trunk/openvas-plugins/scripts/invision_power_board_calendar_sql_injection.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/invision_power_board_calendar_sql_injection.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
   script_id(11977);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_bugtraq_id(9232);
-  script_version("$Revision$");
   script_tag(name:"risk_factor", value:"High");
   name = "Invision Power Board Calendar SQL Injection Vulnerability";
   script_name(name);
@@ -46,10 +48,8 @@
 
 Solution : Upgrade to the latest version of this software.
 
-See also : http://www.invisionboard.com/download/index.php?act=dl&s=1&id=12&p=1
+See also : http://www.invisionboard.com/download/index.php?act=dl&s=1&id=12&p=1";
 
-Risk factor : High";
-
   script_description(desc);
  
   summary = "Detect Invision Power Board Calender SQL Injection";

Modified: trunk/openvas-plugins/scripts/ion_p.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ion_p.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/ion_p.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(11729);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(6091);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CVE-2002-1559");
@@ -41,11 +43,9 @@
 access to confidential data and/or escalate their privileges on
 the Web server.
 
-Solution : remove it from the cgi-bin or scripts directory.
+Solution : remove it from the cgi-bin or scripts directory.";
 
-Risk factor: Medium";
 
-
  script_description(desc);
  
  summary = "Checks for the ion-p.exe file";

Modified: trunk/openvas-plugins/scripts/linksys_ap_default_password.nasl
===================================================================
--- trunk/openvas-plugins/scripts/linksys_ap_default_password.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/linksys_ap_default_password.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -24,9 +24,11 @@
 
 if(description)
 {
- script_version ("$Revision: 1.8 $");
  script_tag(name:"risk_factor", value:"High");
  script_id(80070);;
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
 
  script_xref(name:"OSVDB", value:"821");
 
@@ -40,8 +42,7 @@
 An attacker may connect to it and reconfigure it using this account.
 
 Solution : Connect to this port with a web browser, and click on the 'Password'
-section to set a strong password
-Risk factor : High";
+section to set a strong password";
 
  script_description(desc);
  


Property changes on: trunk/openvas-plugins/scripts/linksys_ap_default_password.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_079.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_079.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/mdksa_2009_079.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(63650);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-03-31 19:20:21 +0200 (Tue, 31 Mar 2009)");
  script_cve_id("CVE-2009-0922");
- script_version ("$");
  script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"risk_factor", value:"Medium");
  name = "Mandrake Security Advisory MDVSA-2009:079 (postgresql)";
@@ -52,10 +54,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:079
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:079";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  summary = "Mandrake Security Advisory MDVSA-2009:079 (postgresql)";


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_079.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_220.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_220.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/mdksa_2009_220.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64692);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_cve_id("CVE-2009-2625");
- script_version ("$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("Mandrake Security Advisory MDVSA-2009:220 (davfs)");
@@ -49,10 +51,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:220
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:220";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:220 (davfs)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_220.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mdksa_2009_284.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_284.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/mdksa_2009_284.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(66086);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-27 01:37:56 +0100 (Tue, 27 Oct 2009)");
  script_cve_id("CVE-2009-3293", "CVE-2009-3546");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("Mandrake Security Advisory MDVSA-2009:284 (gd)");
@@ -56,10 +58,8 @@
 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:284
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:284";
 
-Risk factor : Critical";
-
  script_description(desc);
 
  script_summary("Mandrake Security Advisory MDVSA-2009:284 (gd)");


Property changes on: trunk/openvas-plugins/scripts/mdksa_2009_284.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/minibb_rfi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/minibb_rfi.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/minibb_rfi.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -57,7 +57,9 @@
  # set script identifiers
 
  script_id(80071);;
- script_version("$Revision: 1.9 $");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
 


Property changes on: trunk/openvas-plugins/scripts/minibb_rfi.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/mycio_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mycio_detect.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/mycio_detect.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,7 +26,9 @@
 if(description)
 {
  script_id(10707);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"Low");
  
  name = "McAfee myCIO detection";
@@ -40,10 +42,8 @@
 It is advisable that you block access to this port (TCP 6515) from untrusted 
 networks.
 
-Solution: Configure your firewall to block access to this port (TCP 6515). 
+Solution: Configure your firewall to block access to this port (TCP 6515). ";
 
-Risk factor : Low";
-
  script_description(desc);
  
  summary = "McAfee myCIO detection";

Modified: trunk/openvas-plugins/scripts/netware_tomcat_sourcecode_viewer.nasl
===================================================================
--- trunk/openvas-plugins/scripts/netware_tomcat_sourcecode_viewer.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/netware_tomcat_sourcecode_viewer.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(12119);
-  script_version ("$Revision$: 1.1");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_cve_id("CVE-2000-1210");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
@@ -84,9 +86,7 @@
 
 Solution : Remove default files from the web server. Also, ensure the 
 RCONSOLE password is encrypted and utilize a password protected 
-screensaver for console access.
-
-Risk factor : Medium";
+screensaver for console access.";
      security_warning(port:port, data:warning);
     }
  }

Modified: trunk/openvas-plugins/scripts/nsd_version.nasl
===================================================================
--- trunk/openvas-plugins/scripts/nsd_version.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/nsd_version.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -42,14 +42,14 @@
   Set 'hide-version: yes' in nsd.conf.
 
  See also:
-  http://www.nlnetlabs.nl/projects/nsd/
+  http://www.nlnetlabs.nl/projects/nsd/";
 
- Risk factor : None";
-
 if (description)
 {
  script_id(100208);
- script_version ("1.0");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-05-24 11:22:37 +0200 (Sun, 24 May 2009)");
  script_tag(name:"risk_factor", value:"None");
  script_name("Name Server Daemon Detection");  
  script_description(desc);


Property changes on: trunk/openvas-plugins/scripts/nsd_version.nasl
___________________________________________________________________
Name: svn:keywords
   - ID
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/open_media_collectors_database_37941.nasl
===================================================================
--- trunk/openvas-plugins/scripts/open_media_collectors_database_37941.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/open_media_collectors_database_37941.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100469);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-26 20:04:43 +0100 (Tue, 26 Jan 2010)");
  script_bugtraq_id(37941);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Open Media Collectors Database Multiple Local File Include Vulnerabilities");
@@ -48,10 +50,8 @@
 
 References:
 http://www.securityfocus.com/bid/37941
-http://sourceforge.net/project/showfiles.php?group_id=37089&package_id=29402&release_id=573315
+http://sourceforge.net/project/showfiles.php?group_id=37089&package_id=29402&release_id=573315";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if OpenDb version is 1.5.0.4");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/open_media_collectors_database_37941.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1513.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1513.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1513.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,8 +26,10 @@
 if(description)
 {
  script_id(66165);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)");
  script_cve_id("CVE-2009-3608", "CVE-2009-3609");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("CentOS Security Advisory CESA-2009:1513 (cups)");
@@ -43,10 +45,8 @@
 
 http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1513
 http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1513
-https://rhn.redhat.com/errata/RHSA-2009-1513.html
+https://rhn.redhat.com/errata/RHSA-2009-1513.html";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("CentOS Security Advisory CESA-2009:1513 (cups)");


Property changes on: trunk/openvas-plugins/scripts/ovcesa2009_1513.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/phorum_35134.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phorum_35134.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/phorum_35134.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100214);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-06-01 13:46:24 +0200 (Mon, 01 Jun 2009)");
  script_bugtraq_id(35134);
- script_version ("1.0");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("Phorum 'image/bmp' MIME Type HTML Injection Vulnerability");
@@ -49,10 +51,8 @@
   for more information.
 
  See also:
-  http://www.securityfocus.com/bid/35134
+  http://www.securityfocus.com/bid/35134";
 
- Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if Phorum is vulnerable to MIME Type HTML Injection");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/phorum_35134.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/phpbb_sql_injection3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpbb_sql_injection3.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/phpbb_sql_injection3.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,11 +26,13 @@
 if(description)
 {
  script_id(13655);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(10722);
  script_xref(name:"OSVDB", value:"7811");
  script_xref(name:"OSVDB", value:"7814");
 
- script_version("$Revision$");
  script_tag(name:"risk_factor", value:"High");
  name = "SQL injection in phpBB (3)";
  script_name(name);
@@ -46,8 +48,7 @@
 One vulnerability is reported to exist in 'admin_board.php'. 
 The other pertains to improper characters in the session id variable. 
 
-Solution : Upgrade to the latest version of this software
-Risk factor : High";
+Solution : Upgrade to the latest version of this software";
 
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/phpgroupware_message_script_inject.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpgroupware_message_script_inject.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/phpgroupware_message_script_inject.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(19754);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
  script_bugtraq_id(14724);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  name = "PhpGroupWare Main Screen Message Script Injection Flaw";
@@ -41,8 +43,7 @@
 script code into the main screen message.
 
 Solution : Update to version 0.9.16.007 or newer.
-See also : http://www.phpgroupware.org/
-Risk factor: Medium";
+See also : http://www.phpgroupware.org/";
 
  script_description(desc);
  

Modified: trunk/openvas-plugins/scripts/remote-detect-ApacheOfbiz.nasl
===================================================================
--- trunk/openvas-plugins/scripts/remote-detect-ApacheOfbiz.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/remote-detect-ApacheOfbiz.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,6 +27,8 @@
 {
 script_id(101019);
 script_version("$Revision$");
+script_tag(name:"last_modification", value:"$Date$");
+script_tag(name:"creation_date", value:"2009-04-18 23:46:40 +0200 (Sat, 18 Apr 2009)");
 script_tag(name:"risk_factor", value:"None");
 name = "Apache Open For Business service detection";
 script_name(name);
@@ -39,10 +41,8 @@
 
 Solution :
 It's recommended to allow connection to this host only from trusted hosts or networks,
-or disable the service if not used.
+or disable the service if not used.";
 
-Risk factor : None";
-
 script_description(desc); 
 
 summary = "Detect a running Apache Open For Business automation suite";


Property changes on: trunk/openvas-plugins/scripts/remote-detect-ApacheOfbiz.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/remote-web-w3af.nasl
===================================================================
--- trunk/openvas-plugins/scripts/remote-web-w3af.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/remote-web-w3af.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -23,7 +23,9 @@
 if(description)
 {
  script_id(80109);
- script_version ("1.0");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-18 22:12:25 +0200 (Sun, 18 Oct 2009)");
  script_tag(name:"risk_factor", value:"None");
  name = "w3af (NASL wrapper)";
  script_name(name);
@@ -36,10 +38,8 @@
 
 Note that OpenVAS is using limited set of w3af options.
 Therefore, for more complete web assessment, you should
-use standalone w3af tool for deeper/customized checks.
+use standalone w3af tool for deeper/customized checks.";
 
-Risk factor : None";
-
  script_description(desc);
  
  summary = "Assess web security with w3af";


Property changes on: trunk/openvas-plugins/scripts/remote-web-w3af.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/roxen_counter.nasl
===================================================================
--- trunk/openvas-plugins/scripts/roxen_counter.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/roxen_counter.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(10207);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"High");
  name = "Roxen counter module";
  script_name(name);
@@ -36,11 +38,9 @@
  desc = "The Roxen Challenger webserver is running and the counter module is installed.
 Requesting large counter GIFs eats up CPU-time on the server. If the server does not support threads this will prevent the server from serving other clients.
 
-Solution : Disable the counter-module. There might be a patch available in the future. 
+Solution : Disable the counter-module. There might be a patch available in the future. ";
 
-Risk factor : High";
 
-
  script_description(desc);
  
  summary = "Roxen counter module installed ?";

Modified: trunk/openvas-plugins/scripts/secpod_asterisk_sip_channel_driver_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_asterisk_sip_channel_driver_dos_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_asterisk_sip_channel_driver_dos_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_asterisk_sip_channel_driver_dos_vuln.nasl 3981 2009-08-28 19:33:24Z aug $
+# $Id$
 #
 # Asterisk SIP Channel Driver Denial Of Service Vulnerability (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900834);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-02 09:58:59 +0200 (Wed, 02 Sep 2009)");
   script_tag(name:"cvss_base", value:"7.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-2726");
@@ -77,8 +79,7 @@
 
   CVSS Score:
     CVSS Base Score     : 7.8 (AV:N/AC:L/Au:NR/C:N/I:N/A:C)
-    CVSS Temporal Score : 5.8
-  Risk factor: High";
+    CVSS Temporal Score : 5.8";
 
   script_description(desc);
   script_summary("Check for the Version of Asterisk");


Property changes on: trunk/openvas-plugins/scripts/secpod_asterisk_sip_channel_driver_dos_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_bloggeruniverse_sql_injection_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_bloggeruniverse_sql_injection_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_bloggeruniverse_sql_injection_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_bloggeruniverse_sql_injection_vuln.nasl 17111 2011-09-26 11:29:14 sep $
+# $Id$
 #
 # Bloggeruniverse 'editcomments.php' SQL Injection Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902632);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-27 17:29:53 +0200 (Tue, 27 Sep 2011)");
   script_cve_id("CVE-2009-5090");
   script_bugtraq_id(33744);
   script_tag(name:"cvss_base", value:"6.8");


Property changes on: trunk/openvas-plugins/scripts/secpod_bloggeruniverse_sql_injection_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_cyrus_sasllib_mul_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_cyrus_sasllib_mul_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_cyrus_sasllib_mul_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_cyrus_sasllib_mul_bof_vuln.nasl 2347 2009-05-27 15:05:27Z may $
+# $Id$
 #
 # Cyrus SASL Remote Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900660);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-05-28 07:14:08 +0200 (Thu, 28 May 2009)");
   script_tag(name:"cvss_base", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-0688");
@@ -62,8 +64,7 @@
 
   CVSS Score:
     CVSS Base Score      : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score  : 5.5
-  Risk factor: High";
+    CVSS Temporal Score  : 5.5";
 
   script_description(desc);
   script_summary("Checks for the Version Cyrus SASL library");


Property changes on: trunk/openvas-plugins/scripts/secpod_cyrus_sasllib_mul_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_euphonics_player_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_euphonics_player_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_euphonics_player_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_euphonics_player_bof_vuln.nasl 1039 2009-02-19 17:15:01Z feb $
+# $Id$
 #
 # Euphonics Audio Player Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900459);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-02-20 17:40:17 +0100 (Fri, 20 Feb 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_bugtraq_id(33589);
@@ -66,8 +68,7 @@
 
   CVSS Score:
     CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 7.3
-  Risk factor: Critical";
+    CVSS Temporal Score : 7.3";
 
   script_description(desc);
   script_summary("Check for the version of Euphonics Audio Player");


Property changes on: trunk/openvas-plugins/scripts/secpod_euphonics_player_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl 17309 2011-09-23 12:12:12Z sep $
+# $Id$
 #
 # IBM Lotus Domino Cross Site Scripting and Buffer Overflow Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902572);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
   script_bugtraq_id(49701, 49705);
   script_cve_id("CVE-2011-3575", "CVE-2011-3576");
   script_tag(name:"cvss_base", value:"9.0");


Property changes on: trunk/openvas-plugins/scripts/secpod_ibm_lotus_domino_xss_n_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms09-062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms09-062.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_ms09-062.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms09-062.nasl 5269 2009-10-20 04:46:09Z oct $
+# $Id$
 #
 # Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
 #
@@ -33,7 +33,9 @@
 if(description)
 {
   script_id(900878);
-  script_version("$Revision$: 1.2");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-10-21 10:12:07 +0200 (Wed, 21 Oct 2009)");
   script_tag(name:"cvss_base", value:"9.3");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-2500", "CVE-2009-2501", "CVE-2009-2502", "CVE-2009-2503",
@@ -80,10 +82,8 @@
   References:
   http://support.microsoft.com/kb/957488
   http://www.vupen.com/english/advisories/2009/2897
-  http://www.microsoft.com/technet/security/bulletin/MS09-062.mspx
+  http://www.microsoft.com/technet/security/bulletin/MS09-062.mspx";
 
-  Risk factor: Critical";
-
   script_description(desc);
   script_summary("Check for the version of Msv1_0.dll file");
   script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/secpod_ms09-062.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ms10-071.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms10-071.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_ms10-071.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ms10-071.nasl 11484 2010-10-13 09:09:09Z oct $
+# $Id$
 #
 # Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(901162);
-  script_version("$Revision$: 1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-10-13 17:10:12 +0200 (Wed, 13 Oct 2010)");
   script_cve_id("CVE-2010-3331", "CVE-2010-3330", "CVE-2010-3329", "CVE-2010-3328",
                 "CVE-2010-3327", "CVE-2010-3326", "CVE-2010-3325", "CVE-2010-3243",
                 "CVE-2010-3324", "CVE-2010-0808");


Property changes on: trunk/openvas-plugins/scripts/secpod_ms10-071.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_nero_showtime_remote_bof_vuln_900410.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_nero_showtime_remote_bof_vuln_900410.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_nero_showtime_remote_bof_vuln_900410.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -26,10 +26,12 @@
 if(description)
 {
   script_id(900410);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2008-12-10 17:58:14 +0100 (Wed, 10 Dec 2008)");
   script_cve_id("CVE-2008-7079");
  script_bugtraq_id(32446);
   script_copyright("Copyright (C) 2008 SecPod");
-  script_version("Revision: 1.0");
   script_tag(name:"cvss_base", value:"5.1");
   script_tag(name:"risk_factor", value:"High");
   script_category(ACT_GATHER_INFO);
@@ -60,8 +62,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.1 (AV:N/AC:H/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 4.6
-  Risk factor: High";
+    CVSS Temporal Score : 4.6";
 
   script_description(desc);
   script_dependencies("secpod_reg_enum.nasl");


Property changes on: trunk/openvas-plugins/scripts/secpod_nero_showtime_remote_bof_vuln_900410.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_ntp_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ntp_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_ntp_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_ntp_bof_vuln.nasl 1701 2009-04-23 15:15:28 apr $
+# $Id$
 #
 # NTP Stack Buffer Overflow Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900623);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-04-30 06:40:16 +0200 (Thu, 30 Apr 2009)");
   script_tag(name:"cvss_base", value:"6.8");
   script_tag(name:"risk_factor", value:"High");
   script_cve_id("CVE-2009-0159");
@@ -64,8 +66,7 @@
 
   CVSS Score:
     CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)
-    CVSS Temporal Score : 5.0
-  Risk factor: High";
+    CVSS Temporal Score : 5.0";
 
   script_description(desc);
   script_summary("Check for the version of NTP)");


Property changes on: trunk/openvas-plugins/scripts/secpod_ntp_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_opera_mult_dos_vuln_win.nasl 9170 2010-05-21 15:21:47Z may $
+# $Id$
 #
 # Opera Browser Multiple Denial Of Service Vulnerability (Windows)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902182);
-  script_version("$Revision$:1.0");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2010-05-25 13:56:16 +0200 (Tue, 25 May 2010)");
   script_cve_id("CVE-2010-1989", "CVE-2010-1993");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");


Property changes on: trunk/openvas-plugins/scripts/secpod_opera_mult_dos_vuln_win.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_pidgin_mult_dos_vuln_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_pidgin_mult_dos_vuln_lin.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_pidgin_mult_dos_vuln_lin.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerabilities Test
-# $Id: secpod_pidgin_mult_dos_vuln_lin.nasl 4622 2009-09-15 15:29:58Z sep $
+# $Id$
 #
 # Pidgin Multiple Denial Of Service Vulnerabilities (Linux)
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900941);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-09-15 09:32:43 +0200 (Tue, 15 Sep 2009)");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2009-2703", "CVE-2009-3083", "CVE-2009-3084",
@@ -74,8 +76,7 @@
 
   CVSS Score:
     CVSS Base Score     : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
-    CVSS Temporal Score : 3.7
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.7";
 
   script_description(desc);
   script_summary("Check for the version of Pidgin");


Property changes on: trunk/openvas-plugins/scripts/secpod_pidgin_mult_dos_vuln_lin.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_prochatrooms_dir_trav_n_xss_vuln.nasl 1086 2009-03-30 15:33:29Z mar $
+# $Id$
 #
 # Directory Traversal And XSS Vulnerability In Pro Chat Rooms
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900331);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-03-31 07:06:59 +0200 (Tue, 31 Mar 2009)");
   script_tag(name:"cvss_base", value:"4.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2008-6501", "CVE-2008-6502");
@@ -65,8 +67,7 @@
 
   CVSS Score:
     CVSS Base Score     : 4.0 (AV:N/AC:L/Au:SI/C:N/I:P/A:N)
-    CVSS Temporal Score : 3.6
-  Risk factor: Medium";
+    CVSS Temporal Score : 3.6";
 
   script_description(desc);
   script_summary("Check for the version or XSS in Pro Chat Rooms");


Property changes on: trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl 16835 2011-08-31 11:11:11Z aug $
+# $Id$
 #
 # VMware vFabric tc Server JMX Authentication Security Bypass Vulnerability
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(902565);
-  script_version("$Revision: 1.0$");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-08-31 13:40:07 +0200 (Wed, 31 Aug 2011)");
   script_bugtraq_id(49122);
   script_cve_id("CVE-2011-0527");
   script_tag(name:"cvss_base", value:"5.0");


Property changes on: trunk/openvas-plugins/scripts/secpod_vmware_vfabric_tc_server_security_bypass_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_winamp_mult_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_winamp_mult_bof_vuln.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_winamp_mult_bof_vuln.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -1,6 +1,6 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id: secpod_winamp_mult_bof_vuln.nasl 898 2009-01-27 20:15:29Z jan $
+# $Id$
 #
 # Winamp AIFF File Multiple Buffer Overflow Vulnerabilities
 #
@@ -27,7 +27,9 @@
 if(description)
 {
   script_id(900197);
-  script_version("$Revision: 1.0 $");
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2009-01-29 15:16:47 +0100 (Thu, 29 Jan 2009)");
   script_tag(name:"cvss_base", value:"10.0");
   script_tag(name:"risk_factor", value:"Critical");
   script_cve_id("CVE-2009-0263");
@@ -61,8 +63,7 @@
 
   CVSS Score:
     CVSS Base Score     : 10.0 (AV:N/AC:L/Au:NR/C:C/I:C/A:C)
-    CVSS Temporal Score : 9.0
-  Risk factor: Critical";
+    CVSS Temporal Score : 9.0";
 
   script_description(desc);
   script_summary("Check for the version of Winamp");


Property changes on: trunk/openvas-plugins/scripts/secpod_winamp_mult_bof_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,10 +27,12 @@
 if(description)
 {
  script_id(900126);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2008-09-25 09:10:39 +0200 (Thu, 25 Sep 2008)");
  script_cve_id("CVE-2008-7009");
  script_bugtraq_id(31124);
  script_copyright("Copyright (C) 2008 SecPod");
- script_version("Revision: 1.1 ");
   script_tag(name:"cvss_base", value:"6.9");
   script_tag(name:"cvss_temporal", value:"7.5");
   script_tag(name:"risk_factor", value:"High");
@@ -68,8 +70,7 @@
 
  CVSS Score :
         CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)
-        CVSS Temporal Score : 7.5
- Risk factor : High";
+        CVSS Temporal Score : 7.5";
 
  script_description(desc);
  script_dependencies("secpod_reg_enum.nasl");


Property changes on: trunk/openvas-plugins/scripts/secpod_zonealarm_net_sec_suite_bof_vuln_900126.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/securecrt_remote_overflow.nasl
===================================================================
--- trunk/openvas-plugins/scripts/securecrt_remote_overflow.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/securecrt_remote_overflow.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,11 +28,13 @@
 if(description)
 {
  script_id(15822);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2002-1059");
  script_bugtraq_id(5287);
  script_xref(name:"OSVDB", value:"4991");
  
- script_version("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
   
@@ -48,8 +50,7 @@
 allowing an SSH server to execute arbitrary command via a specially
 long SSH1 protocol version string.
 
-Solution : Upgrade to SecureCRT 3.2.2, 3.3.4, 3.4.6, 4.1 or newer
-Risk factor : High";
+Solution : Upgrade to SecureCRT 3.2.2, 3.3.4, 3.4.6, 4.1 or newer";
 
 
  script_description(desc);

Modified: trunk/openvas-plugins/scripts/simple_form_mail_relaying_via_subject_tags.nasl
===================================================================
--- trunk/openvas-plugins/scripts/simple_form_mail_relaying_via_subject_tags.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/simple_form_mail_relaying_via_subject_tags.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -25,6 +25,8 @@
 if (description) {
   script_id(14713);
   script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_tag(name:"risk_factor", value:"High");
 
   name = "Simple Form Mail Relaying via Subject Tags Vulnerability";
@@ -38,8 +40,7 @@
 for sending abusive mail or spam. 
 
 See also : http://worldcommunity.com/opensource/utilities/simple_form.html
-Solution : Upgrade to Simple Form 2.3 or later.
-Risk factor : High";
+Solution : Upgrade to Simple Form 2.3 or later.";
   script_description(desc);
  
   summary = "Checks for Mail Relaying via Subject Tags Vulnerability in Simple Form";

Modified: trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd0.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd0.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(66282);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)");
  script_cve_id("CVE-2009-3608", "CVE-2009-3609");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for kdegraphics3-pdf");
@@ -48,10 +50,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for kdegraphics3-pdf");


Property changes on: trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd0.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65954);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2007-3999");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for librpcsecgss");
@@ -48,10 +50,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for librpcsecgss");


Property changes on: trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65766);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)");
  script_cve_id("CVE-2008-5518", "CVE-2009-0038", "CVE-2009-0039", "CVE-2009-0781");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.4");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES10: Security update for Websphere Community Edition");
@@ -48,10 +50,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES10: Security update for Websphere Community Edition");


Property changes on: trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(66352);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-12-03 22:10:42 +0100 (Thu, 03 Dec 2009)");
  script_cve_id("CVE-2009-3547", "CVE-2009-2910", "CVE-2009-2903", "CVE-2009-3621", "CVE-2009-3612", "CVE-2005-4881", "CVE-2009-3620", "CVE-2009-3726", "CVE-2009-3286");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for Linux kernel");
@@ -101,10 +103,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for Linux kernel");


Property changes on: trunk/openvas-plugins/scripts/sles11_ext4dev-kmp-def4.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65661);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-1302", "CVE-2009-1303", "CVE-2009-1304", "CVE-2009-1305", "CVE-2009-1307", "CVE-2009-1308", "CVE-2009-1309", "CVE-2009-1311", "CVE-2009-1312", "CVE-2009-0652");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES11: Security update for Mozilla");
@@ -52,10 +54,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for Mozilla");


Property changes on: trunk/openvas-plugins/scripts/sles11_mozilla-xulrunn.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles11_openswan0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_openswan0.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles11_openswan0.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,8 +29,10 @@
 if(description)
 {
  script_id(65692);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)");
  script_cve_id("CVE-2009-2185");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES11: Security update for openswan");
@@ -51,10 +53,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES11: Security update for openswan");


Property changes on: trunk/openvas-plugins/scripts/sles11_openswan0.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5009598.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5009598.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5009598.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65038);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-0400", "CVE-2005-0749", "CVE-2005-1263");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for kernel");
@@ -57,10 +59,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for kernel");


Property changes on: trunk/openvas-plugins/scripts/sles9p5009598.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5010087.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010087.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5010087.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65493);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2004-0782", "CVE-2004-0783", "CVE-2004-0788");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for gdk-pixbuf");
@@ -51,10 +53,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for gdk-pixbuf");


Property changes on: trunk/openvas-plugins/scripts/sles9p5010087.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5010516.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5010516.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5010516.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65318);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for YaST2");
 
@@ -46,10 +48,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for YaST2");


Property changes on: trunk/openvas-plugins/scripts/sles9p5010516.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5012275.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012275.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5012275.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65076);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-3388");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Qt3");
@@ -51,10 +53,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Qt3");


Property changes on: trunk/openvas-plugins/scripts/sles9p5012275.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5012800.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5012800.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5012800.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65343);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-2645");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for libexif");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for libexif");


Property changes on: trunk/openvas-plugins/scripts/sles9p5012800.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5013352.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5013352.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5013352.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65292);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for Mozilla suite nld nlpos oes");
 
@@ -55,10 +57,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for Mozilla suite nld nlpos oes");


Property changes on: trunk/openvas-plugins/scripts/sles9p5013352.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5018245.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5018245.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5018245.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65501);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2007-0555", "CVE-2007-0556");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"8.5");
  script_tag(name:"risk_factor", value:"Critical");
  script_name("SLES9: Security update for PostgreSQL");
@@ -55,10 +57,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Critical";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for PostgreSQL");


Property changes on: trunk/openvas-plugins/scripts/sles9p5018245.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5019072.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019072.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5019072.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65209);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2005-2970");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for apache2-worker");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for apache2-worker");


Property changes on: trunk/openvas-plugins/scripts/sles9p5019072.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5019980.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5019980.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5019980.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65623);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for libpng");
 
@@ -45,10 +47,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for libpng");


Property changes on: trunk/openvas-plugins/scripts/sles9p5019980.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5020047.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5020047.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5020047.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(65352);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for SpamAssassin");
 
@@ -46,10 +48,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for SpamAssassin");


Property changes on: trunk/openvas-plugins/scripts/sles9p5020047.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5024260.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5024260.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5024260.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(65062);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)");
  script_cve_id("CVE-2008-1612");
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"risk_factor", value:"Medium");
  script_name("SLES9: Security update for squid");
@@ -49,10 +51,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor: Medium";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for squid");


Property changes on: trunk/openvas-plugins/scripts/sles9p5024260.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/sles9p5062132.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5062132.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/sles9p5062132.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,7 +28,9 @@
 if(description)
 {
  script_id(66277);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-17 21:42:12 +0100 (Tue, 17 Nov 2009)");
  script_tag(name:"risk_factor", value:"High");
  script_name("SLES9: Security update for ClamAV");
 
@@ -45,10 +47,8 @@
 
 Solution:
 
-Please install the updates provided by SuSE.
+Please install the updates provided by SuSE.";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SLES9: Security update for ClamAV");


Property changes on: trunk/openvas-plugins/scripts/sles9p5062132.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/smb_nt_ms03-009.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_nt_ms03-009.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/smb_nt_ms03-009.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(11433);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(7145);
- script_version ("$Revision$");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
  script_cve_id("CAN-2003-0011");
@@ -41,10 +43,8 @@
 request to an ISA Server computer that is publishing a DNS server, which 
 could then result in a denial of service to the published DNS server.
 
-Solution : see http://www.microsoft.com/technet/security/bulletin/ms03-009.mspx
+Solution : see http://www.microsoft.com/technet/security/bulletin/ms03-009.mspx";
 
-Risk factor : Medium";
-
  script_description(desc);
  
  summary = "Checks for ISA Server DNS HotFix SP1-256";

Modified: trunk/openvas-plugins/scripts/smtp_backdoor.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smtp_backdoor.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/smtp_backdoor.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -25,7 +25,9 @@
 if(description)
 {
  script_id(18391);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"Medium");
  name = "SMTP server on a strange port";
  script_name(name);
@@ -34,8 +36,7 @@
 This might be a backdoor set up by crackers to send spam
 or even control your machine.
 
-Solution: Check and clean your configuration
-Risk factor : Medium";
+Solution: Check and clean your configuration";
 
  script_description(desc);
  script_summary( "An SMTP server is running on a non standard port");

Modified: trunk/openvas-plugins/scripts/smtp_too_long_line.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smtp_too_long_line.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/smtp_too_long_line.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,7 +27,9 @@
 if(description)
 {
  script_id(11270);
- script_version ("$Revision$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  name = "SMTP too long line";
  script_name(name);
  script_tag(name:"risk_factor", value:"High");


Property changes on: trunk/openvas-plugins/scripts/smtp_too_long_line.nasl
___________________________________________________________________
Name: svn:keywords
   - Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/support_incident_tracker_37949.nasl
===================================================================
--- trunk/openvas-plugins/scripts/support_incident_tracker_37949.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/support_incident_tracker_37949.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,10 +27,12 @@
 if (description)
 {
  script_id(100467);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2010-01-26 20:04:43 +0100 (Tue, 26 Jan 2010)");
  script_tag(name:"cvss_base", value:"6.8");
  script_cve_id("CVE-2010-1596");
  script_bugtraq_id(37949);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"High");
 
  script_name("Support Incident Tracker Blank Password Authentication Bypass Vulnerability");
@@ -51,10 +53,8 @@
 References:
 http://www.securityfocus.com/bid/37949
 http://sitracker.sourceforge.net
-http://sitracker.org/wiki/ReleaseNotes351
+http://sitracker.org/wiki/ReleaseNotes351";
 
-Risk factor: High";
-
  script_description(desc);
  script_summary("Determine if Support Incident Tracker version is < 3.51");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/support_incident_tracker_37949.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/suse_sa_2009_045.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_045.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_045.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -28,8 +28,10 @@
 if(description)
 {
  script_id(64761);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)");
  script_cve_id("CVE-2008-5033", "CVE-2009-0676", "CVE-2009-1046", "CVE-2009-1385", "CVE-2009-1389", "CVE-2009-1630", "CVE-2009-1758", "CVE-2009-1895", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-2692");
- script_version ("$");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"risk_factor", value:"High");
  script_name("SuSE Security Advisory SUSE-SA:2009:045 (kernel)");
@@ -111,10 +113,8 @@
 Update your system with the packages as indicated in
 the referenced security advisory.
 
-https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:045
+https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:045";
 
-Risk factor : High";
-
  script_description(desc);
 
  script_summary("SuSE Security Advisory SUSE-SA:2009:045 (kernel)");


Property changes on: trunk/openvas-plugins/scripts/suse_sa_2009_045.nasl
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/uebimiau_session_disclosure.nasl
===================================================================
--- trunk/openvas-plugins/scripts/uebimiau_session_disclosure.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/uebimiau_session_disclosure.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -29,7 +29,9 @@
 if(description)
 {
  script_id(16279);
- script_version("$Revision 1.1$");
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"risk_factor", value:"Medium");
  
  name = "Uebimiau Session Directory Disclosure";
@@ -62,10 +64,8 @@
 <Directory /server-target/public_html>
  php_admin_value open_basedir
  /server-target/public_html
-</Directory>
+</Directory>";
 
-Risk factor : Medium";
-
  script_description(desc);
  
  summary = "Checks for the presence of sessions directory of UebiMiau";

Modified: trunk/openvas-plugins/scripts/weblogic_percent.nasl
===================================================================
--- trunk/openvas-plugins/scripts/weblogic_percent.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/weblogic_percent.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -25,8 +25,10 @@
 if(description)
 {
  script_id(10698);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_bugtraq_id(2513);
- script_version ("$Revision$");
  script_tag(name:"risk_factor", value:"High");
  name = "WebLogic Server /%00/ bug";
  

Modified: trunk/openvas-plugins/scripts/xm_easy_ftp_37008.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xm_easy_ftp_37008.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/xm_easy_ftp_37008.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -27,8 +27,10 @@
 if (description)
 {
  script_id(100342);
+ script_version("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2009-11-13 12:21:24 +0100 (Fri, 13 Nov 2009)");
  script_bugtraq_id(37008,36969);
- script_version ("1.0-$Revision$");
  script_tag(name:"risk_factor", value:"Medium");
 
  script_name("XM Easy Personal FTP Server 'NLST' Command Remote Denial of Service Vulnerability");
@@ -47,10 +49,8 @@
 http://www.securityfocus.com/bid/37008
 http://www.securityfocus.com/bid/36969
 http://www.securityfocus.com/archive/1/507785
-http://www.dxm2008.com/
+http://www.dxm2008.com/";
 
-Risk factor : Medium";
-
  script_description(desc);
  script_summary("Determine if XM Easy Personal FTP Server is prone to a remote denial-of-service vulnerability");
  script_category(ACT_GATHER_INFO);


Property changes on: trunk/openvas-plugins/scripts/xm_easy_ftp_37008.nasl
___________________________________________________________________
Name: svn:keywords
   - Id Revision
   + Author Date Id Revision

Modified: trunk/openvas-plugins/scripts/xtux_server.nasl
===================================================================
--- trunk/openvas-plugins/scripts/xtux_server.nasl	2011-11-09 15:59:45 UTC (rev 12073)
+++ trunk/openvas-plugins/scripts/xtux_server.nasl	2011-11-09 16:10:49 UTC (rev 12074)
@@ -36,8 +36,10 @@
 if(description)
 {
   script_id(11016);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
   script_bugtraq_id(4260);
-  script_version ("$Revision$");
   script_tag(name:"cvss_base", value:"5.0");
   script_tag(name:"risk_factor", value:"Medium");
   script_cve_id("CVE-2002-0431");
@@ -48,10 +50,8 @@
 The xtux server might be running on this port. If somebody connects to
 it and sends it garbage data, it may loop and overload your CPU.
 
-Solution: disable it, or at least firewall it
+Solution: disable it, or at least firewall it";
 
-Risk factor : Medium";
-
   script_description(desc);
  
   summary = "Detect xtux server";



More information about the Openvas-commits mailing list